Aggregator
valorant level bots
Hackers exploit Four-Faith router flaw to open reverse shells
Play
Play
Play
Play
Randall Munroe’s XKCD ‘Sun Avoidance’
via the comic humor & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Sun Avoidance’ appeared first on Security Boulevard.
Randall Munroe’s XKCD ‘Sun Avoidance’
VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
Cariad, VW Group’s software arm, made this classic error.
The post VW Cars Leak Private Data of 800,000 — ‘Volksdaten’ appeared first on Security Boulevard.
VW Cars Leak Private Data of 800,000 — ‘Volksdaten’
Dumping Memory to Bypass BitLocker on Windows 11
CVE-2024-46542 | Veritas Data Insight up to 7.1.0 sql injection
CVE-2024-56733 | pglombardo PasswordPusher up to 1.50.3 session fixiation (GHSA-4fwj-m62q-pp47)
CVE-2024-56734 | better-auth up to 1.1.5 Email Verification callbackURL redirect (GHSA-8jhw-6pjj-8723)
CVE-2024-56517 | tltneon lgsl up to 6.2.1 HTTP Header Referer cross site scripting (GHSA-ggwq-xc72-33r3)
CVE-2024-56516 | RockChinQ free-one-api up to 1.0.1 weak hash (GHSA-36cc-58vm-wm4h)
Апполоний: как геометрия античности покорила космическое пространство
New Botnet Exploiting D-Link Routers To Gain Control Remotely
Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which exploit known vulnerabilities in D-Link routers, including those with outdated firmware like DIR-645, DIR-806, GO-RT-AC750, and DIR-845L. Attackers leverage the HNAP protocol to execute malicious commands remotely on vulnerable devices, which, despite being known for […]
The post New Botnet Exploiting D-Link Routers To Gain Control Remotely appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
The watering hole attack leverages a compromised website to deliver malware. When a user visits the infected site, their system downloads an LZH archive containing an LNK file, where executing this LNK file triggers a malware infection. An infected website utilizes JavaScript to stealthily download malware onto user systems when specific accounts with Basic authentication […]
The post Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.