Aggregator
CVE-2024-5076 | WP-FeedStats wp-eMember Plugin up to 10.6.5 on WordPress cross-site request forgery
CVE-2024-5033 | SULly Plugin up to 4.3.0 on WordPress cross-site request forgery
CVE-2024-39735 | IBM Datacap Navigator 9.1.5/9.1.6/9.1.7/9.1.8/9.1.9 Web UI cross site scripting (XFDB-296002)
CVE-2024-39728 | IBM Datacap Navigator 9.1.5/9.1.6/9.1.7/9.1.8/9.1.9 Web UI cross site scripting (XFDB-295967)
CVE-2024-6345 | pypa setuptools up to 69.1.1 package_index code injection (Nessus ID 207922)
How AI and automation are reshaping security leadership
The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, the promise of security automation is coming to fruition. In theory and practice, security automation should truncate the time SOCs spend investigating and mitigating alerts. However, the tried and true saying about technology still applies: Cybersecurity still relies on the combination of people, processes, and technology. For some time, … More →
The post How AI and automation are reshaping security leadership appeared first on Help Net Security.
3 AI-Driven Roles in Cybersecurity
BlackBasta Ransomware Ties to Russian Authorities Uncovered
Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security
APIs: The Gateway to Dynamic 5G Networks
CVE-2008-4525 | AmpJuke 0.7.5 index.php special sql injection (EDB-32461 / XFDB-45665)
Google Buys Wiz in $32bn Cloud Security Push
Stealthy StilachiRAT steals data, may enable lateral movement
While still not widely distributed, a new Windows remote access trojan (RAT) dubbed StilachiRAT is a serious threat. “[The malware] demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data,” Microsoft threat analysts have warned on Monday. The StilachiRAT StilachiRAT’s capabilities include: Collection of information that helps paint a picture of the target system: OS/system info, hardware identifiers, BIOS serial number, camera presence, active Remote Desktop Protocol (RDP) sessions, software … More →
The post Stealthy StilachiRAT steals data, may enable lateral movement appeared first on Help Net Security.
New BitM Attack Enables Hackers to Hijack User Sessions in Seconds
A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers to hijack user sessions across various web applications in a matter of seconds. This method exploits the inherent functionalities of web browsers to deceive victims into believing they are interacting with a secure connection, while […]
The post New BitM Attack Enables Hackers to Hijack User Sessions in Seconds appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2011-5049 | MySQL 5.5.8 resource management (EDB-18269 / XFDB-71965)
Hackers Exploit Hard Disk Image Files to Deploy VenomRAT
In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware, exploiting a novel technique to bypass security measures. This campaign begins with a phishing email that uses a purchase order as a lure, enticing users to open an attached archive file. Upon extraction, the archive […]
The post Hackers Exploit Hard Disk Image Files to Deploy VenomRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.