From Cookie Consent to Command Execution: A Real-World SQLi + Full PII Leak to RCE on a Careers…
文章描述了一次通过cookie consent参数发现的SQL注入攻击,该漏洞存在于一家大型汽车公司的职业门户网站中。攻击者利用这一漏洞获得了全数据库访问权限,并成功提取了管理员凭证,进而控制了管理面板和实现了远程代码执行。作者强调了对所有用户输入进行验证的重要性,并建议使用参数化查询来防止类似漏洞。
A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake Keylogger malware through fraudulent emails impersonating TUSAŞ (Turkish Aerospace Industries). The malicious campaign distributes files disguised as contractual documents, specifically using the filename “TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe” to deceive recipients into […]
The post Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials appeared first on Cyber Security News.