Aggregator
CVE-2023-20883 | Oracle Banking Electronic Data Exchange for Corporates 14.5/14.6/14.7 Reports denial of service (EUVD-2023-1651)
Как меняется роль CISO: от эксперта по управлению рисками к руководителю с влиянием на стратегию бизнеса
McDonald’s Hiring Bot: Would You Like A Side of PII With That?
An AI hiring bot intended to streamline the job application process has instead created a super-sized privacy headache for McDonald’s.
The post McDonald’s Hiring Bot: Would You Like A Side of PII With That? appeared first on Security Boulevard.
Устойчив к болезням, морозу и высоте: в Тибете родился первый клонированный як
RenderShock 0-Click Exploit Executes Payloads Silently via Background Process
A new class of cyberattack called RenderShock has been identified that can compromise enterprise systems without requiring any user interaction, exploiting the very productivity features designed to help workers preview and process files automatically. Unlike traditional malware that requires users to click on malicious attachments or links, RenderShock leverages passive execution surfaces that operate silently […]
The post RenderShock 0-Click Exploit Executes Payloads Silently via Background Process appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
JVN: Apache HTTP Server 2.4における複数の脆弱性に対するアップデート
CVE-2025-24391 | OTRS up to 7.0.x/8.0.x/2023.x/2024.x/2025.5.x External Interface information exposure (EUVD-2025-21322 / WID-SEC-2025-1545)
CVE-2024-26292 | Avid NEXIS E-series prior 2025.5.1 on Linux/Windows path traversal (EUVD-2024-23563)
CVE-2024-26291 | Avid NEXIS E-series prior 2025.5.1 on Linux/Windows filename improper authorization (EUVD-2024-23562)
Devman
You must login to view this content
Threats Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
Threat actors, ranging from state-sponsored organizations to non-state actors, are using sophisticated cyber weapons to breach and destroy vital infrastructure in a time when digital and physical security are becoming more intertwined. These tools, often manifesting as malware agents like worms, viruses, and advanced persistent threats (APTs), exploit vulnerabilities in supervisory control and data acquisition […]
The post Threats Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2006-0407 | AZbb AZ Bulletin Board up to 1.1.00 post.php Name cross site scripting (EDB-27120 / XFDB-24274)
Хакеры заставили Gemini врать пользователям прямо в лицо
CVE-2008-0255 | Igamingcms Igaming Cms up to 1.3.1 archive.php section sql injection (EDB-4886 / XFDB-39598)
CVE-2017-15012 | EMC OpenText Documentum Content Server up to 7.3 RPC Command input validation (EDB-43003 / BID-101639)
Indian Police Raid Tech Support Scam Call Center
一张屋顶照片,开源情报如何锁定它的秘密坐标
美国全球开源情报合作体系全解析
Sarcoma
You must login to view this content