Aggregator
CVE-2023-24728 | SourceCodester Simple Customer Relationship Management System 1.0 User Profile Update Contact sql injection (EUVD-2023-28738)
CVE-2023-24698 | Foswiki up to 2.1.7 viewfile file inclusion (EUVD-2023-28708)
CVE-2023-24675 | Bludit CMS 3.14.1 Categories Friendly URL cross site scripting (EUVD-2023-28686)
CVE-2023-24709 | Paradox Security Systems IPR512 login.html cross site scripting (ID 171783 / EUVD-2023-28719)
CVE-2023-24671 | VX Search 13.8/14.7 unquoted search path (ID 171300 / EUVD-2023-28682)
CVE-2023-24674 | Bludit CMS 4.0.0 role:admin permission (EUVD-2023-28685)
CVE-2023-48087 | xxl-job-admin 2.4.0 clearLog permission (Issue 3330 / EUVD-2023-2867)
CVE-1999-0526 | X.org X11 Server Access Control improper authentication (VU#704969 / Nessus ID 19948)
CVE-1999-0524 | Linux Kernel ICMP Timestamp/Netmask information disclosure (Nessus ID 10114 / ID 82001)
CVE-1999-0527 | Host FTP Server privileges management (Nessus ID 10088 / ID 27031)
CVE-1999-0532 | DNS Server Zone Transfer privileges management (Nessus ID 10595 / ID 15019)
Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
Southeast Asia’s online gambling ecosystem has become a breeding ground for sophisticated cyber threats, with criminal networks leveraging seemingly legitimate platforms to distribute malicious software to millions of unsuspecting users. A recently uncovered operation demonstrates how threat actors exploit the region’s thriving illegal gambling market by deploying a weaponized browser disguised as a privacy tool. […]
The post Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program appeared first on Cyber Security News.
How Secure Are Your Machine Identities?
How Effective Is Your Non-Human Identity Management? Are your data security strategies truly effective in safeguarding machine identities within your organization’s cloud infrastructure? Where businesses increasingly rely on machine identities—or Non-Human Identities (NHIs) —to automate and streamline processes, the importance of managing these identities cannot be overstated. Machine identities are the backbone of modern cloud […]
The post How Secure Are Your Machine Identities? appeared first on Entro.
The post How Secure Are Your Machine Identities? appeared first on Security Boulevard.
Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
Cybercriminals have adopted a sophisticated social engineering strategy that exploits the trust inherent in job hunting, according to a recent security advisory. A financially motivated threat cluster operating from Vietnam has been targeting digital advertising and marketing professionals through fake job postings on legitimate employment platforms and custom-built recruitment websites. The campaign, which leverages remote […]
The post Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials appeared first on Cyber Security News.
Everest
You must login to view this content
Qilin
You must login to view this content
Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules
A sophisticated cyberattack campaign targeting Microsoft Internet Information Services (IIS) servers has emerged, exploiting decades-old security vulnerabilities to deploy malicious modules that enable remote command execution and search engine optimization fraud. The operation, which came to light in late August and early September 2025, leverages publicly exposed ASP.NET machine keys to compromise servers worldwide, affecting […]
The post Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules appeared first on Cyber Security News.
Top 10 Best Cloud Workload Protection Platforms (CWPP) in 2025
The cloud landscape in 2025 continues its unprecedented growth, with organizations of all sizes rapidly migrating critical workloads to public, private, and hybrid cloud environments. While cloud providers meticulously secure their underlying infrastructure, the onus of protecting everything within that infrastructure from virtual machines (VMs) and containers to serverless functions and data squarely falls on […]
The post Top 10 Best Cloud Workload Protection Platforms (CWPP) in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.