Aggregator
CVE-2024-24332 | Totolink A3300R 17.0.0cu.557_B20221024 setUrlFilterRules url command injection
CVE-2024-22643 | SEO Panel 4.10.0 Password Reset cross-site request forgery
CVE-2024-22569 | POSCMS 4.6.2 cross site scripting (Issue 12)
CVE-2024-2309 | WP STAGING Backup Plugin up to 3.3.x on WordPress Setting cross site scripting
CVE-2024-2761 | Genesis Blocks Plugin up to 3.1.2 on WordPress cross site scripting
CVE-2023-7252 | Tickera Plugin up to 3.5.2.4 on WordPress Ticket authorization
CVE-2023-40490 | Maxon Cinema 4D 2023.2.1 SKP File Parser use after free (ZDI-23-1190)
CVE-2024-33999 | Moodle admin/tool/mfa/index.php HTTP_REFERER input validation
CVE-2023-43845 | Aten PE6208 2.3.228/2.4.232 Telnet Console default credentials
CVE-2023-30309 | D-Link DI-7003GV2 TCP denial of service
CVE-2024-28060 | Apiris Kafeo 6.4.4 uncontrolled search path
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials
A sophisticated phishing campaign leveraging shared infrastructure between two prominent cybercriminal operations has emerged as a significant threat to Office 365 users worldwide. The Tycoon2FA Phishing-as-a-Service platform, which has been active since August 2023, has established operational connections with the notorious Storm-1575 group, also known as Dadsec, creating a formidable alliance in the cybercrime ecosystem. […]
The post Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials appeared first on Cyber Security News.
删除Office文档个人隐私信息
纽创信安祝您端午安康顺遂!
Kingpin's Journey Through Hacking History
Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware
Cybercriminals are increasingly exploiting the growing popularity of artificial intelligence tools by distributing sophisticated malware disguised as legitimate AI solution installers. This emerging threat landscape has seen malicious actors create convincing replicas of popular AI platforms, using these deceptive packages to deploy devastating ransomware and destructive malware onto unsuspecting victims’ systems. The proliferation of AI […]
The post Beware of Weaponized AI Tool Installers That Infect Your Devices With Ransomware appeared first on Cyber Security News.