Aggregator
Submit #653191: itsourcecode Student Information Management System V1.0 SQL injection [Accepted]
Raven Stealer Targets Google Chrome Users to Exfiltrate Sensitive Data
Raven Stealer, a sophisticated information-stealing malware that has been wreaking havoc on users’ sensitive data. This contemporary malware represents a concerning evolution in credential theft technology, combining advanced evasion techniques with streamlined data exfiltration capabilities. Raven Stealer stands out as a lightweight yet highly effective information-stealing malware developed primarily in Delphi and C++. Cybersecurity researchers […]
The post Raven Stealer Targets Google Chrome Users to Exfiltrate Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #653159: whuan132 AIBattery v1.0.9 Unauthenticated XPC to root helper exposes SMC power controls [Accepted]
Submit #653029: https://gitee.com/youth-is-as-pale-as-poetry/e-learning ExamSystem V1.0 Authentication Bypass Issues [Accepted]
Submit #652396: itsourcecode E-Logbook with Health Monitoring System for COVID-19 V1.0 SQL Injection [Accepted]
Submit #652356: GitHub Airsonic-Advanced 10.6.0 OS Command Injection [Accepted]
Почти как TeamViewer, но не он. Вышла новая версия RustDesk, кроссплатформенного приложения для удалённого рабочего стола
Submit #652176: itsourcecode Online Discussion Forum Project V1.0 SQL Injection [Accepted]
Product showcase: Exaforce – The full lifecycle AI SOC platform
Today’s SOCs face an impossible equation: too much noise, too many gaps, and too few hands. Detection coverage gaps leave companies exposed, false positives overwhelm analysts, manual investigations eat up valuable hours from the most expensive assets (experienced analysts), responses are slow or based on rigid playbooks, and the costs of these systems scale in untenable ways. Exaforce was built to change that. By combining a unique multi-model AI purpose-built for security operations with agentic … More →
The post Product showcase: Exaforce – The full lifecycle AI SOC platform appeared first on Help Net Security.
Submit #652170: itsourcecode Online Discussion Forum Project V1.0 SQL Injection [Duplicate]
Submit #652167: itsourcecode Online Discussion Forum Project V1.0 SQL Injection [Accepted]
Submit #652047: D-Link DIR-825 Rev.B 2.10 Buffer Overflow [Accepted]
Submit #651941: github.com Course Selection System V1.0 SQL Injection [Accepted]
Submit #651933: PHPGurukul Small CRM V4.0 SQL Injection [Accepted]
Submit #651914: PHPGurukul Online Course Registration V3.1 SQL Injection [Accepted]
Submit #650262: Grocy 4.5.0 Cross Site Scripting [Duplicate]
Submit #650261: Grocy 4.5.0 Cross Site Scripting [Duplicate]
Submit #649866: SeaCMS V13.3 SQL Injection [Accepted]
Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links
Cybersecurity researchers at Varonis Threat Labs have uncovered a persistent vulnerability that has remained unaddressed for over a decade, allowing attackers to exploit browser handling of Right-to-Left (RTL) and Left-to-Right (LTR) text scripts to create deceptive URLs. This technique, known as BiDi Swap, enables threat actors to craft malicious links that appear legitimate to unsuspecting […]
The post Hackers Abuse RTL/LTR Text Tricks and Browser Flaws to Mask Malicious Links appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.