Aggregator
China’s ‘Typhoons’ changing the way FBI hunts sophisticated threats
Two major hacking groups have pushed the bureau to adapt how they respond to stealthier, more patient attacks, a top FBI official said.
The post China’s ‘Typhoons’ changing the way FBI hunts sophisticated threats appeared first on CyberScoop.
CVE-2012-1775 | VideoLAN VLC Media Player up to 2.0.1 mmstu.c MMSOpen MSS Stream memory corruption (EDB-18825 / Nessus ID 62114)
CVE-2012-5335 | Saurabh Gupta Tiny Server 1.1.5 path traversal (EDB-18610 / Nessus ID 10297)
CVE-2012-5691 | RealNetworks RealPlayer 15.0.6.14 RealMedia File memory corruption (EDB-23694 / Nessus ID 63289)
CVE-2012-2576 | SolarWinds Storage Manager/Storage Profiler/Backup Profiler up to 5.1.1 LoginServlet Page loginName sql injection (EDB-18818 / XFDB-72680)
CVE-2012-6429 | Samsung Kies 2.5.0.12114 1 ActiveX Control SyncService.dll Password memory corruption (Advisory 119423 / EDB-38206)
CVE-2012-1221 | RabidHamster R2/Extreme up to Extreme Telnet Server path traversal (EDB-36829 / XFDB-73114)
CVE-2025-59049 | mockoon up to 9.1.x file inclusion (EUVD-2025-27607)
CVE-2025-10247 | JEPaaS 7.2.8 Filter doFilterInternal access control
CVE-2025-10246 | lokibhardwaj PHP-Code-For-Unlimited-File-Upload up to 124fe96324915490c81eaf7db3234b0b4e4bab3c /f.php h cross site scripting
Submit #642413: JEPaaS v7.2.8 Access Control Check Implemented After Asset is Accessed [Accepted]
Submit #642206: lokibhardwaj PHP-Code-For-Unlimited-File-Upload Master CWE-79 XSS [Accepted]
CVE-2025-10245 | Display Painéis TGA up to 7.1.41 Galeria Page /gallery/rename current_folder path traversal (EUVD-2025-27625)
Submit #642068: Display Painéis TGA 7 7.1.41 Path Traversal [Accepted]
Unlocking Hidden Capabilities in Wi-Fi Chips
Reverse engineering Wi-Fi chips opens new opportunities for security research. Security researchers Daniel Wegemer and Edoardo Mantovani describe tools, methods and motivations for unlocking hidden functions and enabling deeper hardware analysis.
AI Accelerates Code Development But Fuels New Security Risks
AI is reshaping how software is created, allowing more people to participate in the process through "vibe coding." But as development accelerates, security challenges multiply as code is often deployed without thorough review, said Joe Sullivan, former CSO at Cloudflare, Facebook and Uber.
Money Mule Networks Surge 168% Fueling Digital Banking Fraud
Organized crime groups have industrialized digital banking fraud operations in the United States, with money mule networks surging 168% in the first half of 2025. Money mules are being recruited at unprecedented scale, and they're using stablecoins to transfer funds to crypto exchanges.
Jaguar Land Rover Hackers Stole Data
British carmaker Jaguar Land Rover on Wednesday said hackers stole "some data" in the cyberattack detected earlier this month. The Tata Motors-owned luxury carmaker shut down assembly lines in the United Kingdom, Slovakia, Brazil and India after a Sept. 1 cyberattack.
BSidesSF 2025: How To Train Your Detection Dragon
Creator, Author and Presenter: Geet Pradhan
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: How To Train Your Detection Dragon appeared first on Security Boulevard.