Aggregator
CVE-2024-45270 | Sayful Islam Carousel Slider Plugin up to 2.2.3 on WordPress Hero Image Selection cross-site request forgery
它凭什么两度入选Gartner NDR客户之声“强劲表现者”?
CVE-2007-2000 | Raphael Limbach Crea-Book 1.0 admin/admin.php passe sql injection (EDB-3701 / XFDB-33555)
CVE-2014-5869 | CNN CNNMoney Portfolio 1.03 X.509 Certificate cryptographic issues (VU#582497)
CVE-2014-9144 | Technicolor TD5130 Router 2.05.C29GV Firmware command injection (ID 129374 / EDB-35462)
North Korean hackers’ social engineering tricks
“North Korean malicious cyber actors conducted research on a variety of targets connected to cryptocurrency exchange-traded funds (ETFs) over the last several months,” the FBI has warned through a public service announcement. This suggests that they are likely to target companies associated with cryptocurrency ETFs or other cryptocurrency-related financial products, the Bureau added. North Korean hackers are after money State-sponsored North Korean hackers have specialized in brazen crypto-heists, aimed at bringing income into the hermit … More →
The post North Korean hackers’ social engineering tricks appeared first on Help Net Security.
CVE-2017-16411 | Adobe Acrobat Reader memory corruption (APSB17-36 / Nessus ID 104626)
Lynx
RansomHub
Top Cyber Attacker Techniques, May–July 2024
Top Cyber Attacker Techniques, May–July 2024
偏信则暗 —— Penpie 被黑分析
Major Leap for Nuclear Clock Paves Way for Ultraprecise Timekeeping
Learning, Sharing, and Exploring with NIST’s New Human-Centered Cybersecurity Community of Interest
MuddyWater свирепствует: легальные RMM-программы на службе у иранских хакеров
Secure by Demand: Going Beyond Questionnaires and SBOMs
CISA’s Secure by Demand guidance provides a list of questions that enterprise software buyers should ask software producers to evaluate their security practices prior to, during and after procurement. It’s a good idea in principle as every organization needs to be asking the questions presented in “Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem.”
The post Secure by Demand: Going Beyond Questionnaires and SBOMs appeared first on Security Boulevard.