Aggregator
CVE-2014-0783 | Yokogawa CENTUM CS 3000 up to R3.07 BKHOdeq.exe memory corruption (EDB-32209 / ID 42426)
CVE-2014-0784 | Yokogawa CENTUM CS 3000 up to R3.07 BKBCopyD.exe memory corruption (EDB-32210 / ID 42426)
CVE-2014-100015 | SolidWorks Product Data Management 2014 File Upload pdmwService.exe path traversal (ID 125361 / EDB-31831)
CVE-2014-7288 | Symantec Encryption Management Server up to 3.3.2 MP6 Email Header access control (SYM15-002 / EDB-35949)
CVE-2014-1202 | Smartbear SoapUI up to 4.6.3 SOAP code injection (ID 124773 / EDB-30908)
马斯克威胁苹果,想要提高其 AI 应用 Grok 的排名
SmartLoader Malware Masquerades as Legitimate GitHub Repository to Infect Users
AhnLab Security Intelligence Center (ASEC) has uncovered a sophisticated campaign involving the massive dissemination of SmartLoader malware through GitHub repositories designed to mimic legitimate software projects. These repositories target users searching for popular illicit content such as game cheats, software cracks, and automation tools, appearing at the top of search results on platforms like Google […]
The post SmartLoader Malware Masquerades as Legitimate GitHub Repository to Infect Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
Erlang/OTP SSH Vulnerability Sees Spike in Exploitation Attempts
Bronbeek staat stil bij 80 jaar vrijheid en verzetsheld Pieter de Kock
AI 和海外游戏发力,腾讯重回 7000 亿美金
Думали, левитация — фантастика? Японцы запустили грузовых роботов в воздух
New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems
If you think phishing is just clicking a bad link and landing on a fake login page, Tycoon2FA will prove you wrong. This new wave of phishing-as-a-service isn’t playing the old game anymore; it’s running a 7-stage obstacle course built to wear down both humans and machines. It’s already slipping past trusted security tools. If […]
The post New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems appeared first on Cyber Security News.
Google 允许美国印度用户选择他们喜欢的内容来源
German Manufacturing Company Data Sale, 188,000+ Records Allegedly for Sale
CVE-2023-1992 | Wireshark up to 3.6.12/4.0.4 RPCoRDMA Dissector denial of service (Issue 18852 / EUVD-2023-24172)
США тайно оснащают чипы Nvidia и AMD трекерами для выявления поставок в Китай
BSidesSF 2025: Fake Hires, Real Threats: When Background Checks Aren’t Enough
Creator, Author and Presenter: Mabel Soe
Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the conference’s events held at the lauded CityView / AMC Metreon - certainly a venue like no other; and via the organization's YouTube channel.
Additionally, the organization is welcoming volunteers for the BSidesSF Volunteer Force, as well as their Program Team & Operations roles. See their succinct BSidesSF 'Work With Us' page, in which, the appropriate information is to be had!
The post BSidesSF 2025: Fake Hires, Real Threats: When Background Checks Aren’t Enough appeared first on Security Boulevard.