Aggregator
探讨如何避免微软崩盘类事件及安全软件相关问题| 总第259周
Submit #399538: github//HFO4/ shudong-share 2.4.7 Arbitrary File Upload [Accepted]
CVE-2024-3673 | Web Directory Free Plugin up to 1.7.2 on WordPress include path traversal
CVE-2024-42412 | ELECOM WAB-I1750-PS/WAB-S1167-PS up to 1.5.10 menu.cgi cross site scripting
Игровая катастрофа в STEAM: ботнет AISURU сорвал запуск Black Myth: Wukong
CVE-2024-34577 | Elecom WRC-X3000GS2-B/WRC-X3000GS2-W/WRC-X3000GS2A-B up to 1.08 easysetup.cgi cross site scripting
DMARC Deployment Phases: What to Expect and How to Prepare
Reading Time: 6 min Master DMARC deployment in 5 steps. Learn to configure SPF/DKIM, analyze reports, and gradually enforce policies.
The post DMARC Deployment Phases: What to Expect and How to Prepare appeared first on Security Boulevard.
DMARC Deployment Phases: What to Expect and How to Prepare
CVE-2024-39300 | Elecom WAB-I1750-PS up to 1.5.10 Telnet missing authentication
【公告】JSRC七月英雄榜单揭晓
【活动】中秋月圆,京东安全邀您共庆
Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites
Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis Group (TAG) observed these attacks, which have been linked to the Russian government-backed actor APT29. The hackers have repeatedly used the same exploits, initially developed by commercial surveillance vendors, to breach security defenses. This article […]
The post Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
暗影助力|第十三届KCon“同道”大会后记(附公开PPT下载链接)
On Slicks and Satellites: An Open Source Guide to Marine Oil Spill Detection
Google Pixel Security: Android App Makes Phones Vulnerable
In jointly published analysis by Palantir Technologies and Trail of Bits pertaining to Google Pixel security, it has been revealed that Pixel phones shipped worldwide since 2017 host a dormant app. The app, if exploited, can become a staging ground for attacks and can be used for delivering various kinds of malware. In this article, […]
The post Google Pixel Security: Android App Makes Phones Vulnerable appeared first on TuxCare.
The post Google Pixel Security: Android App Makes Phones Vulnerable appeared first on Security Boulevard.