Aggregator
CVE-2024-12252 | seobeginner SEO LAT Auto Post Plugin up to 2.2.1 on WordPress seo-beginner-auto-post.php remote_update code injection
CVE-2024-12159 | muzaara Optimize Your Campaigns Plugin up to 3.1 on WordPress print_php_information.php information disclosure
India’s Draft Digital Personal Data Protection Rules
India has unveiled its draft Digital Personal Data Protection Rules, designed to operationalize the Digital Personal Data Protection Act, 2023 (DPDP Act). As the nation strides forward in the digital age, these rules are pivotal in creating a framework that balances the protection of individual privacy with the need for innovation in a burgeoning digital […]
The post India’s Draft Digital Personal Data Protection Rules appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-54763 | ipTIME A2004 12.17.0 /login/hostinfo.cgi information disclosure
CVE-2024-54767 | AVM Fritz Box 7530 AX 7.59 /juis_boxinfo.xml information disclosure
CVE-2024-54764 | ipTIME A2004 12.17.0 /login/hostinfo2.cgi information disclosure
CVE-2024-11749 | appizy App Embed Plugin up to 2.3.2 on WordPress Shortcode cross site scripting
CVE-2024-53933 | com.callerscreen.colorphone.themes.callflash up to 1.0.7 on Android DialerActivity Component permission
CVE-2024-53935 | com.callos14.callscreen.Colorphone up to 4.3 on Android DialerActivity Component permission
CVE-2024-53934 | com.windymob.callscreen.ringtone.callcolor.colorPhone DialerActivity Component permission
Прорыв в литографии: тулиевый лазер экономит гигаватты энергии
CVE-2024-53932 | com.remi.colorphone.callscreen.calltheme.callerscreen DialerActivity Component permission
CVE-2024-53931 | com.glitter.Caller.screen up to 1.1 on Android DialerActivity Component permission
CVE-2024-12419 | tobias_conrad Design for Contact Form 7 Style Plugin up to 1.6.9 on WordPress Shortcode do_shortcode code injection
CVE-2024-12261 | marekzak01 SmartEmailing.cz Plugin up to 2.2.0 on WordPress se-lists-updated cross site scripting
CVE-2024-11382 | Common Ninja Plugin up to 1.1.0 on WordPress Shortcode commonninja cross site scripting
Making the most of cryptography, now and in the future
Enterprise cryptography faces risks beyond just the advent of quantum computers. For starters, there is no guarantee that the traditional algorithms have not been broken. Though we believe that it is “unlikely” they can be, the reality is that in a conventional computing world, compute power advances and older cryptographic techniques have been revealed to be insecure. In addition to the cryptography algorithms themselves, we should remember that cryptography is also implemented in software, which … More →
The post Making the most of cryptography, now and in the future appeared first on Help Net Security.
China's Hacking of US Telecoms: Officials Name More Victims
The nine known victims of a "broad and significant cyberespionage campaign" the White House has tied to China reportedly include Charter Communications, Consolidated Communications and Windstream, as officials said the hackers' earliest known telecom network penetration began in mid-2023.
Nuclei Patches High Severity Flaw in Security Tool
Open-source vulnerability scanner Nuclei patched a critical flaw in its open-source vulnerability management tool ProjectDiscovery. Security firm Wiz uncovered the flaw, a signature verification system flaw that could allow attackers to execute malicious code using custom code templates.