Aggregator
Microsoft: January Windows security updates break audio playback
CVE-2020-10387 | Chadha PHPKB Standard Multi-Language 9 admin/download.php file path traversal (ID 156754 / EDB-48220)
CVE-2000-0412 | Gnapster/Knapster privileges management (EDB-19905 / Nessus ID 10408)
CVE-2024-55591: Fortinet FortiOS Authentication Bypass Proof of Concept
Apple security advisory (AV25-045)
TalkTalk confirms data breach involving a third-party platform
DEF CON 32 – Simulating Attacks Against Hydroelectric Power Plants
Author/Presenter: Julia Dewitz-Würzelberger
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Simulating Attacks Against Hydroelectric Power Plants appeared first on Security Boulevard.
Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam
A large-scale phishing campaign is using PDF files and hidden malicious links, as well as posing at the U.S. Postal Service, in phishing campaign targeting mobile device users in hope that victims will divulge credentials and personal information, Zimperium researchers say.
The post Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam appeared first on Security Boulevard.