Aggregator
SSH密钥:被忽视的最高危凭证治理盲区
1 month 4 weeks ago
当前环境出现异常,请完成验证以继续访问。
SSH密钥:被忽视的最高危凭证治理盲区
1 month 4 weeks ago
SSH密钥普遍缺乏有效管理,已成为重大的安全风险隐患。
SECUROTROP The Emerging Hub Behind Qilin Ransomware Operations
1 month 4 weeks ago
You must login to view this content
cohenido
ThreeAM
1 month 4 weeks ago
You must login to view this content
cohenido
Стилер-торнадо SHUYAL — приходит, сгребает всё до последнего пикселя и испаряется в Telegram
1 month 4 weeks ago
Вредонос нового уровня наглости.
Debian 13.0 Trixie 的新变化
1 month 4 weeks ago
代号为 Trixie 的 Debian 13.0 将于 8 月 9 日释出,新版本将有哪些变化?apt 更新到 v3.0,支持以不同颜色区分更新或下载;systemd 升级到 257.7-1;Kernel 为 6.12 LTS 版;Prometheus server 更新到 v2.53,OpenSSH 更新到 v10.0p1-5;此外还有大量软件包更新。
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
Gli attacchi a SharePoint confermano la necessità di protezioni crittografiche forti
1 month 4 weeks ago
微软SharePoint遭遇零日漏洞攻击,凸显网络安全威胁。专家指出,仅靠防御工具无法保障数据安全,需采用加密技术。军事级AES-256加密和严格密钥管理可有效防止数据泄露。通过制定详细策略和分层保护机制,企业可提升整体安全性。
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
Web Fuzzer 新的热加载函数——重试控制与错误处理
1 month 4 weeks ago
将手动决策自动化、代码化!
Web Fuzzer 新的热加载函数——重试控制与错误处理
1 month 4 weeks ago
当前环境异常,请完成验证后继续访问,并点击“去验证”进行操作。
CVE-2025-8191 | macrozheng mall up to 1.0.3 Swagger UI /swagger-ui/index.html configUrl cross site scripting
1 month 4 weeks ago
A vulnerability, which was classified as problematic, was found in macrozheng mall up to 1.0.3. Affected is an unknown function of the file /swagger-ui/index.html of the component Swagger UI. The manipulation of the argument configUrl leads to cross site scripting.
This vulnerability is traded as CVE-2025-8191. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor deleted the GitHub issue for this vulnerability without any explanation. Afterwards the vendor was contacted early about this disclosure via email but did not respond in any way.
vuldb.com
记一次域渗透从打点到内网
1 month 4 weeks ago
一、环境信息本次靶场涉及多台主机,其 IP 信息如下:kali 攻击机:172.20.10.3web 服务器:外网 IP 为 172.20.10.3,内网 IP 为 192.168.93.100web - Ubantu:192.168.93.12win7:192.168.93.30win2008:192.168.93.20win2012:192.168.93.10二、外网阶段渗透1. 信息收集首先
QilinSecuro
1 month 4 weeks ago
You must login to view this content
cohenido
Submit #615733: https://github.com/macrozheng/mall <=1.0.3 JWT Secret Hardcoded lead to Account Take Over [Duplicate]
1 month 4 weeks ago
Submit #615733 / VDB-285842
ZAST.AI