Aggregator
游戏MOD伴随盗号风险,仿冒网站借“风灵月影”窃密
Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords
Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper’s Session Smart Networking Platform (SSR). According to SANS tech reports, Attackers are focusing their efforts on exploiting devices using the default credentials, “t128” as the username and “128tRoutes” as the password, which are remnants from Juniper’s acquisition of 128 Technologies. The surge in […]
The post Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-0905 | Fancy Product Designer Plugin up to 6.1.7 on WordPress cross site scripting
CVE-2024-2603 | Salon Booking System Plugin up to 9.6.5 on WordPress Setting cross site scripting
CVE-2024-2429 | Salon Booking System Plugin up to 9.6.5 on WordPress Setting cross-site request forgery
CVE-2024-2908 | Call Now Button Plugin up to 1.4.6 on WordPress Setting cross site scripting
CVE-2024-2159 | Social Sharing Plugin up to 3.3.60 on WordPress Shortcode Attribute cross site scripting
CVE-2024-2439 | Salon Booking System Plugin up to 9.6.5 on WordPress Setting cross site scripting
CVE-2024-3059 | ENL Newsletter Plugin up to 1.0.1 on WordPress cross-site request forgery
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on April 3, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-093-01 Hitachi Energy RTU500 Series
- ICSA-25-093-02 Hitachi Energy TRMTracker
- ICSA-25-093-03 ABB ACS880 Drives Containing CODESYS RTS
- ICSA-25-093-04 ABB Low Voltage DC Drives and Power Controllers CODESYS RTS
- ICSA-25-093-05 B&R APROL
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat
Today, CISA—in partnership with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ)—released joint Cybersecurity Advisory Fast Flux: A National Security Threat (PDF, 841 KB). This advisory warns organizations, internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities and provides guidance on detection and mitigations to safeguard critical infrastructure and national security.
“Fast flux” is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System (DNS) records associated with a single domain name. This threat exploits a gap commonly found in network defenses, making the tracking and blocking of malicious fast flux activities difficult.
The authoring agencies strongly recommend adopting a multi-layered approach to detection and mitigation to reduce risk of compromise by fast flux-enabled threats. Service providers, especially Protective DNS providers (PDNS), should track, share information about, and block fast flux as part of their provided cybersecurity services. Government and critical infrastructure organizations should close this ongoing gap in network defenses by using cybersecurity and PDNS services that block malicious fast flux activity.
For more information on PDNS services, see Selecting a Protective DNS Service.