Aggregator
CVE-2012-5913 | WordPress Integrator 1.32 wp-integrator.php redirect_to cross site scripting (EDB-37016 / XFDB-74475)
CVE-2004-1926 | Tiki TikiWiki 1.6.1/1.8.1 code injection (EDB-43809 / Nessus ID 14364)
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
A sophisticated new variant of the AMOS macOS stealer has emerged, demonstrating unprecedented levels of technical sophistication in its distribution and obfuscation methods. The malware leverages GitHub repositories as distribution platforms, exploiting the platform’s legitimacy to bypass security measures and target unsuspecting macOS users with cryptocurrency theft capabilities. The latest campaign involves a multi-layered attack […]
The post AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods appeared first on Cyber Security News.
Frida编译调试与Hook技术实战:赠 android rat源码供学习
驱动挂钩所有内核导出函数来进行驱动逻辑分析
CVE-2018-6396 | Google Map Landkarten up to 4.2.3 on Joomla cid/id sql injection (EDB-44113 / BID-103094)
Palo Alto Networks fixed multiple privilege escalation flaws
Weekly Threat Landscape Digest – Week 24
Date: Jun 13, 2025 – Week 24 This week’s threat landscape highlights the evolving sophistication of threat actors, who are […]
The post Weekly Threat Landscape Digest – Week 24 appeared first on HawkEye.
CVE-2000-0925 | Smartwin Technology Cyberoffice Shopping Cart 2.0 the _private privileges management (EDB-20248 / XFDB-5318)
Tenable Agent for Windows Vulnerability Let Attackers Login as Admin to Delete The System Files
Tenable, a prominent cybersecurity provider, has released version 10.8.5 of its Agent software to address three critical security vulnerabilities affecting Windows hosts running versions prior to 10.8.5. These flaws, identified as CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, could allow non-administrative users to exploit SYSTEM-level privileges, potentially leading to severe system compromise or local privilege escalation. Vulnerability Details […]
The post Tenable Agent for Windows Vulnerability Let Attackers Login as Admin to Delete The System Files appeared first on Cyber Security News.
Блокчейн + квантовая физика + паранойя = идеальный способ подкинуть монетку
CVE-2004-1925 | Tiki Tikiwiki 1.6.1/1.8.1 sql injection (EDB-43809 / Nessus ID 14364)
CVE-2007-3590 | b1g b1gBB 2.24 visitenkarte.php User cross site scripting (EDB-4122 / XFDB-35131)
NIST Released 19 Zero Trust Architecture Implementations Guide – What’s New
The National Institute of Standards and Technology (NIST) has published a new resource to aid organizations in implementing zero trust architectures (ZTAs), a cybersecurity approach that assumes no user or device is inherently trustworthy. The guidance, titled Implementing a Zero Trust Architecture (NIST SP 1800-35), details 19 example ZTA implementations using commercially available technologies, offering […]
The post NIST Released 19 Zero Trust Architecture Implementations Guide – What’s New appeared first on Cyber Security News.