Aggregator
CVE-2024-47003 | Mattermost up to 9.5.8/9.11.0 Permalink Post resource consumption
CVE-2024-42406 | Mattermost up to 9.5.8/9.9.2/9.10.1/9.11.0 Archived Channel access control
TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data
The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data, exfiltrates sensitive information, and aims to inflict maximum damage on critical assets. The threat actor likely scans IP address ranges in Russia to identify VPN servers and applications accessible from the internet that could serve […]
The post TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-6517 | Contact Form 7 Math Captcha Plugin up to 2.0.1 on WordPress cross site scripting
解锁SSA IR代码审计新姿势?牛牛来了!
CVE-2024-4278 | GitLab Enterprise Edition prior 17.2.8/17.3/17.3.4/17.4/17.4.1 Dependency Proxy Setting incorrect synchronization (Issue 458484)
CVE-2024-45843 | Mattermost up to 9.5.8 server-side request forgery
内部如何防止终端中毒?各家强密码具体要求是什么?法律角度下,不同方式加密传输手机号的区别是什么?【 总第262周】
Researchers Backdoored Azure Automation Account Packages And Runtime Environments
Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can’t be directly modified, they can be indirectly changed by adding packages to the old experience and then switching to the new Runtime Environments feature. It could potentially be exploited by attackers who create new runtime environments […]
The post Researchers Backdoored Azure Automation Account Packages And Runtime Environments appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Код будущего: Android становится неприступной крепостью
Hackers Weaponizing PDF files To Deliver New SnipBot Malware
The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted credential gathering. It employs various attack methods, including PDF-based downloaders and executable payloads, to compromise victim systems. The threat actors behind RomCom have been active since at least 2022 and utilize stolen or fraudulently obtained […]
The post Hackers Weaponizing PDF files To Deliver New SnipBot Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.