Aggregator
安卓开发+逆向分析实战课:从底层开发到 AI 融合,附赠2本PDF算法书、源码包
Linux Sudo 曝重大漏洞可提权至root并绕过主机限制,速更新!
某日游mmap模块化保护简单分析
案例分享 | 行业标准落地先锋:某上市区域性银行开源治理实战解析
Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely
A critical remote code execution (RCE) vulnerability affecting Django web applications, demonstrating how seemingly benign CSV file upload functionality can be weaponized for complete server compromise. Summary1. Django RCE exploit chains directory traversal with CSV parser abuse to compromise servers through file uploads.2. Attackers use unsanitized username input (../../../../../../app/backend/backend/) to target Django's wsgi.py file.3. Malicious […]
The post Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely appeared first on Cyber Security News.
Blind Eagle Hackers Leverage Open-Source RATs and Ciphers to Evade Static Detection
Trustwave SpiderLabs has uncovered a chilling cyber threat targeting Latin American organizations, particularly in the financial sector, with a focus on Colombian institutions. The threat cluster, linked to the notorious Proton66 OOO infrastructure, employs a cunning mix of open-source Remote Access Trojans (RATs) and advanced obfuscation techniques to bypass static detection mechanisms. Unmasking a Sophisticated […]
The post Blind Eagle Hackers Leverage Open-Source RATs and Ciphers to Evade Static Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DEVMAN Ransomware: Analysis of New DragonForce Variant
Editor’s note: The current article is authored by Mauro Eldritch, offensive security expert and threat intelligence analyst. You can find Mauro on X. New ransomware strains continue to surface frequently, and many of them are loosely built on or repackaged from existing families. One such case involves a sample resembling DragonForce ransomware, yet bearing several […]
The post DEVMAN Ransomware: Analysis of New DragonForce Variant appeared first on ANY.RUN's Cybersecurity Blog.
OpenForensicRules 发布!
Scam Centers Expand Global Footprint with Trafficked Victims
宁夏某通讯运营商业务数据遭窃取:因代理商伙同内鬼违规操作
黑客入侵水坝运营系统,私自完全打开阀门数小时
North Korean IT Workers Employ New Tactics to Infiltrate Global Organizations
Microsoft Threat Intelligence has uncovered a sophisticated operation by North Korean remote IT workers who are leveraging cutting-edge artificial intelligence (AI) tools to infiltrate organizations worldwide. Since at least 2020, these highly skilled individuals, often based in North Korea, China, and Russia, have been targeting technology-related roles across various industries to generate revenue for the […]
The post North Korean IT Workers Employ New Tactics to Infiltrate Global Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Страна в руинах, вышек больше нет, связь обрезана. Осталась одна надежда — интернет из стратосферы
告别文档捉迷藏!一键解锁企业知识的正确打开方式
Китай или рынок ЕС: Германия выставила ультиматум Apple и Google
Brave New Kernel: Microsoft Previews Safer Windows Ecosystem
Nearly one year after a faulty CrowdStrike software update disrupted 8.5 million Windows hosts, causing global IT chaos, Microsoft is previewing multiple resilience changes to Windows, including enabling third-party endpoint security tools to do their magic without needing kernel-level access.
Another Billing Software Vendor Hacked by Ransomware
Horizon Healthcare RCM is the latest revenue cycle management software vendor to report a health data breach involving ransomware and data theft. The firm's breach notification statement suggests that the company paid a ransom to prevent the disclosure of its stolen information.
German BSI Head: Tech Sovereignty Needs Technical Solution
European ambitions to replace foreign tech solutions with domestic alternatives are "unrealistic" in the short term, warned the head of the German cybersecurity head cybersecurity agency in a call for greater technological control over cloud platforms.