Aggregator
.NET 分享一款EIS系统密码解密工具
1 year 7 months ago
【2025合作伙伴巡礼】文达电子:专注加密领域的安全态势感知
1 year 7 months ago
【2025合作伙伴巡礼】天鉴科技:立足取证,服务实战
1 year 7 months ago
立足取证,服务实战
谛听 工控安全月报 | 7月
1 year 7 months ago
7月│月报 谛听工控安全月报上线了,工信部的最新政策,7月发生的多起工控安全事件,谛听团队收集的最新攻击教据......更多安全资讯,请关注“谛听ditecting",每月更新!
KL-001-2024-010: Journyx Unauthenticated XML External Entities Injection
1 year 7 months ago
Full Disclosuremailing list archivesFrom: KoreLogic Disclosures via Fulldisclosu
Hazy Issue in Entra ID Allows Privileged Users to Become Global Admins
1 year 7 months ago
Invisible authentication mechanisms in Microsoft allow any attacker to escalate from privileged to super-duper privileged in cloud environments, paving the way for complete takeover.
Nate Nelson, Contributing Writer
Ronin Network hacked, $12 million returned by "white hat" hackers
1 year 7 months ago
Gambling blockchain Ronin Network suffered a security incident yesterday when white hat hackers exploited an undocumented vulnerability on the Ronin bridge to withdraw 4,000 ETH and 2 million USDC, totaling $12 million. [...]
Bill Toulas
SEC ends probe into MOVEit attacks impacting 95 million people
1 year 7 months ago
The SEC concludes its investigation into Progress Software's handling of the widespread exploitation of a MOVEit Transfer zero-day flaw that exposed data of over 95 million people. [...]
Lawrence Abrams
FBI: BlackSuit ransomware behind over $500 million in ransom demands
1 year 7 months ago
CISA and the FBI confirmed today that the Royal ransomware rebranded to BlackSuit and has demanded over $500 million from victims since it emerged more than two years ago. [...]
Sergiu Gatlan
FBI: BlackSuit ransomware made over $500 million in ransom demands
1 year 7 months ago
CISA and the FBI confirmed today that the Royal ransomware rebranded to BlackSuit and has demanded over $500 million from victims since it emerged more than two years ago. [...]
Sergiu Gatlan
Monitoring Changes in KEV List Can Guide Security Teams
1 year 7 months ago
The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.
Robert Lemos, Contributing Writer
Почему SOAR мертвы?!
1 year 7 months ago
Counting the API arguments…
1 year 7 months ago
Today Matt posted a half-joking twit about the acceptable number of arguments that can be p
How to Build-in Security as a SaaS Feature: A Guide
1 year 7 months ago
In this post, I'm going to show you how to provide more granular and more secure connectivity to and
Easterly: Too early to say if Supreme Court’s Chevron decision will affect cyber incident notification rules
1 year 7 months ago
LAS VEGAS – The head of the leading U.S. cybersecurity agency said it is too early to know whether
Splitting the email atom: exploiting parsers to bypass access controls
1 year 7 months ago
Published: 07 August 2024 at 21:32 UTC
New CMoon USB worm targets Russians in data theft attacks
1 year 7 months ago
error code: 1106
CVE-2024-7598
1 year 7 months ago
Network restriction bypass via race condition during namespace termination
New CMoon USB worm targets Russians in data theft attacks
1 year 7 months ago
A new self-spreading worm named 'CMoon,' capable of stealing account credentials and other data, has been distributed in Russia since early July 2024 via a compromised gas supply company website. [...]
Bill Toulas