Aggregator
超过 66 万台 Rsync 服务器受到代码执行攻击
网传支付宝出现P0级事故 任意类型付款甚至转账都自动叠加国补优惠20%
【漏洞通告】Rsync缓冲区溢出与信息泄露漏洞(CVE-2024-12084/CVE-2024-12085)通告
AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks
AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024 that leveraged a 0DAY vulnerability on cnPilot routers and used RC4 encryption for sample strings. After a brief pause in September, the botnet reappeared in October with the name kitty and was updated again in November as AIRASHI. The current […]
The post AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Отельный бизнес потерял контроль над данными 24 млн туристов
Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
A threat actor has leaked configuration files (aka configs) for over 15,000 Fortinet Fortigate firewalls and associated admin and user credentials. The collection has been leaked on Monday and publicized on an underground forum by the threat actor that goes by “Belsen_Group”, supposedly as a free offering to solidify the name of the group in the forum users’ memory. The leaked 1.6 GB archive contains folders ordered by country, and inside each are folders named … More →
The post Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them? appeared first on Help Net Security.
Malware Trends Overview Report: 2024
The Truth of the Matter: Scammers Targeting Truth Social Users
【安全圈】Fortinet 又被确认存在新的零日漏洞
【安全圈】超过 660,000 个 Rsync 服务器遭受代码执行攻击
【安全圈】TikTok计划本周日关停美国业务
【安全圈】2024年12月涉国内数据泄露事件汇总
Trusted Apps Sneak a Bug Into the UEFI Boot Process
New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware
Botnets are the networks of compromised devices that have evolved significantly since the internet’s inception. Threat actors exploit vulnerabilities to control these devices remotely by leveraging them for malicious activities. These activities range from spamming to launching devastating distributed denial-of-service (DDoS) attacks, as the decentralized nature of botnets presents significant challenges to defenders. By orchestrating […]
The post New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
MikroTik botnet relies on DNS misconfiguration to spread malware
MikroTik botnet relies on DNS misconfiguration to spread malware
思科发布人工智能防御系统,抵御模型安全风险
FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches
The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to develop and implement a comprehensive information security program. This decision comes in response to allegations that the prominent web hosting company has consistently failed to adequately secure its services, risking the safety of millions of customers who rely on its platform. […]
The post FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.