Aggregator
Красный — для машин, зелёный — для жертвы: ястреб в США освоил городскую охоту
60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details
A Socket’s Threat Research Team has revealed a sophisticated and ongoing campaign targeting the npm ecosystem, involving 60 malicious packages published under three distinct accounts: bbbb335656, cdsfdfafd49Group2436437, and sdsds656565. First detected just eleven days ago, with the latest package appearing mere hours before this report, these packages embed a covert script that activates during the […]
The post 60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Alleged Sale of Admin Panel Access to Two Government Websites
CVE-2006-4220 | Novell GroupWise 5.57e/6.5.7/7.0/7.0.0 WebAccess user.html cross site scripting (EDB-31095 / BID-27582)
Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
Cybersecurity experts have noted an increase in data breaches where threat actors are directly querying internal databases to steal sensitive information. Unlike traditional malware-based attacks, these adversaries are leveraging legitimate database client tools such as DBeaver, Navicat, and sqlcmd to exfiltrate data from targeted systems. These tools, often used by legitimate administrators for database management, […]
The post Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2012-5102 | Dariusz Handzlik VertrigoServ 2.25 ext cross site scripting (EDB-36508 / XFDB-72140)
CVE-2016-5764 | Micro Focus Rumba FTP up to 4.4 memory corruption (EDB-40651 / BID-93974)
CVE-2008-6019 | DO-CMS 3.0 index.php sql injection (EDB-32671 / XFDB-47467)
360预警:动态攻击链推动威胁升级,新一代勒索软件Kalxat来袭
The Hidden Cyber Risks in Your Executive Team’s Digital Footprint
Executive Team’s Digital Footprint Exposure Is Real Executives, board members, and other high-profile users carry more than just influence – they carry risk. With access to strategic assets, critical systems, and high-trust communications, these individuals are prime targets for threat actors. And in the age of oversharing, infostealers, and deepfakes, an executive’s digital footprint becomes …
The post The Hidden Cyber Risks in Your Executive Team’s Digital Footprint appeared first on Security Boulevard.