Aggregator
CVE-2024-27957 | Pie Register Plugin up to 3.8.3.1 on WordPress unrestricted upload
CVE-2024-27958 | Themeisle Visualizer Plugin up to 3.10.5 on WordPress cross site scripting
CVE-2024-25591 | Benjamin Rojas WP Editor Plugin up to 1.2.7 on WordPress information disclosure
Akira
Lockbit
RansomHub
CVE-1999-0347 | Micosoft Internet Explorer 4.01 javascript URL authentication spoofing (EDB-19156 / XFDB-2069)
Generative AI Shows Promise for Faster Triage of Vulnerabilities
Modern Approach to Attributing Hacktivist Groups
Research by: Itay Cohen (@megabeets_) Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor website defacements and distributed denial-of-service (DDoS) attacks, which, while making headlines, had minimal lasting impact. However, in recent years, we have observed a significant shift in the nature of these activities. Groups that appear to […]
The post Modern Approach to Attributing Hacktivist Groups appeared first on Check Point Research.
Some TXT about, and A PTR to, new DNS insights on Cloudflare Radar
Hackers Can Crack Into Car Cameras in Minutes Flat
Ocean Infinity 重新开始搜寻 MH370
Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works
Threat Intelligence Feeds from ANY.RUN provide a continuously-updated stream of the latest indicators of compromise. They enable SOC teams to quickly detect and mitigate attacks, including emerging malware and persistent threats. But how do ANY.RUN’s feeds get enriched with fresh and, most importantly, unique indicators? Let’s find out. About ANY.RUN’s Threat Intelligence Feeds ANY.RUN’s Threat […]
The post Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works appeared first on ANY.RUN's Cybersecurity Blog.