Aggregator
Trends and dangers in open-source software dependencies
A C-suite perspective on potential vulnerabilities within open-source dependencies or software packages reveals that, while remediation costs for dependency risks are perilously high, function-level reachability analysis still offers the best value in this critical area, according to Endor Labs. The research is based on analysis of Endor Labs vulnerability data, the Open Source Vulnerabilities (OSV) database for comparison, information from customer tenants, and Java Archives (JARs) of hundreds of versions of the top 15 open … More →
The post Trends and dangers in open-source software dependencies appeared first on Help Net Security.
CVE-2014-6773 | bowenehs CIH Quiz game 1.3 X.509 Certificate cryptographic issues (VU#582497)
eBook: Navigating compliance with a security-first approach
As cyberattacks escalate, more regulations are being introduced to help protect organizations and their customers’ data. This has resulted in a complex web of legislation with which companies in the private sector must comply. It can be challenging, as industry standards and requirements often overlap. This e-book: Provides a practical guide to help companies understand the role of password and credential security within the regulatory landscape Outlines how Dark Web, password, and credential screening solutions … More →
The post eBook: Navigating compliance with a security-first approach appeared first on Help Net Security.
CVE-2014-6772 | Unitedecu United Educational CU 1.0.27 X.509 Certificate cryptographic issues (VU#582497)
YARA-X's Dump Command, (Sun, Sep 15th)
Malware locks browser in kiosk mode to steal Google credentials
FBI tells public to ignore false claims of hacked voter data
Windows vulnerability abused braille “spaces” in zero-day attacks
CVE-2007-2749 | FAQEngine 4.16.03 question.php questionref sql injection (EDB-3943 / XFDB-34355)
CVE-2007-2750 | SimpNews 2.40.01 print.php newsnr sql injection (EDB-3942 / XFDB-34356)
.NET内网实战:通过FSharp白名单执行命令
SoapShell 更新 | 新增调用cmd执行系统命令
一个永久的.NET渗透工具和知识仓库
CVE-2010-2307 | Motorola Surfboard Sbv6120e Sbv6x2x-1.0.0.5-scm-02-shpc path traversal (EDB-12865 / XFDB-59113)
iPhone 16「秋裤色」丑上热搜;特斯拉 Robotaxi 小车曝光;《流浪地球2》3D 版上映 | 极客早知道
Power Pwn: An offensive security toolset for Microsoft 365
Power Pwn An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform. Modules: Copilot Connector and Automator Allow interaction with Copilot for Microsoft 365 through the WebSocket messages...
The post Power Pwn: An offensive security toolset for Microsoft 365 appeared first on Penetration Testing Tools.
waymore: find even more links from the Wayback Machine
waymore The idea behind waymore is to find even more links from the Wayback Machine than other existing tools. 👉 The biggest difference between waymore and other tools is that it can also download the archived responses for URLs on...
The post waymore: find even more links from the Wayback Machine appeared first on Penetration Testing Tools.
Hubble: Network, Service & Security Observability for Kubernetes
Hubble Hubble is a fully distributed networking and security observability platform for cloud-native workloads. It is built on top of Cilium and eBPF to enable deep visibility into the communication and behavior of services as well as...
The post Hubble: Network, Service & Security Observability for Kubernetes appeared first on Penetration Testing Tools.