Aggregator
CVE-2024-45337:Golang 密码库存在漏洞,存在授权绕过的风险
1 year 4 months ago
安全客
CVE-2024-38819:Spring 框架路径遍历 PoC 漏洞利用已发布
1 year 4 months ago
安全客
Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks
1 year 4 months ago
A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks targeting Pakistan.
Cybersecurity company Securonix, which is tracking the activity under the name FLUX#CONSOLE, said it likely starts with a phishing email link or attachment, although it said it couldn't obtain the original email used to launch the attack.
"One of the
The Hacker News
DeceptionAds 通过 3,000 个网站和虚假验证码页面提供超过 100 万的日点击量
1 year 4 months ago
安全客
Akira
1 year 4 months ago
cohenido
Empowering Women in Cybersecurity: Lessons from the FS-ISAC Women’s Networking Event
1 year 4 months ago
Discover strategies for empowering women in cybersecurity, gleaned from lessons learned at the 2024 FS-ISAC women’s networking event.
Lisa Beegle
5G Standalone Deployments: Where Are We?
1 year 4 months ago
Unlike 5G non-standalone (NSA) that is connected to the 4G LTE core network infrastructure, 5G standalone (SA) works independently and is deployed with dedicated 5G equipment and network functionalities. 5G SA networks link to a cloud-native 5G core that can deliver a more complete experience for support of advanced...
Agnes Mends-Crentsil
LeakedData
1 year 4 months ago
cohenido
Nitrogen
1 year 4 months ago
cohenido
Nitrogen
1 year 4 months ago
cohenido
Review of Blackhat EMEA 2024
1 year 4 months ago
A review of some interesting briefings and tools found at Blackhat EMEA 2024.
The post Review of Blackhat EMEA 2024 appeared first on The Cyber Hut.
The post Review of Blackhat EMEA 2024 appeared first on Security Boulevard.
Simon Moffatt
Fog
1 year 4 months ago
cohenido
Fog
1 year 4 months ago
cohenido
YouTube 让内容创作者选择允许其视频用于第三方 AI 训练
1 year 4 months ago
YouTube 宣布将在未来几天推出一项可选择加入的功能,让内容创作者和版权所有者选择允许第三方公司使用其视频内容去训练 AI。该选项“Third-party training”位于 YouTube Studio 设置下,默认是不允许。创作者可以选择允许哪些第三方公司,也可以不加选择的允许任何第三方公司。YouTube 表示,未经许可抓取视频的做法是不允许的。
Фейковые обновления против криптоинвесторов: CoinLurker не щадит никого
1 year 4 months ago
WebView2 от Microsoft стал входным билетом для вирусов.
How I Broke the Speed Limit: A Bug Bounty Tale of Bypassing Rate Limiting
1 year 4 months ago
CVE-2024-9819 | NextGeography NG Analyser up to 2.2.710 authorization
1 year 4 months ago
A vulnerability, which was classified as problematic, was found in NextGeography NG Analyser up to 2.2.710. This affects an unknown part. The manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2024-9819. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-55645 | Moodle up to 4.1.14/4.3.8/4.4.4/4.5.0 Email Change Confirmation Token information disclosure
1 year 4 months ago
A vulnerability, which was classified as problematic, has been found in Moodle up to 4.1.14/4.3.8/4.4.4/4.5.0. Affected by this issue is some unknown functionality of the component Email Change Confirmation Token. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2024-55645. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-55644 | Moodle up to 4.1.14/4.3.8/4.4.4/4.5.0 Tag Index Page information disclosure
1 year 4 months ago
A vulnerability classified as problematic was found in Moodle up to 4.1.14/4.3.8/4.4.4/4.5.0. Affected by this vulnerability is an unknown functionality of the component Tag Index Page. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2024-55644. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com