Aggregator
CVE-2009-4933 | Winterwebs Ezwebitor Login login.php sql injection (EDB-8487 / XFDB-49966)
Сгенерил ИИ-видео в «Dream Machine»? Что ж, твоя крипта уже в кармане у хакеров
CVE-2025-27533 | Apache ActiveMQ up to 5.16.7/5.17.6/5.18.6/6.1.5 OpenWire Command memory allocation (EDB-52288 / Nessus ID 235662)
New Exploit Method Extracts Microsoft Entra Tokens Through Beacon
A novel exploit method leveraging Beacon Object Files (BOFs) has emerged, enabling attackers to extract Microsoft Entra (formerly Azure AD) tokens from compromised endpoints, even on non-domain-joined or BYOD devices. This technique sidesteps traditional detection mechanisms and expands access to high-value targets, posing significant risks to enterprise cloud environments. PRT Extraction Limits on BYOD Devices […]
The post New Exploit Method Extracts Microsoft Entra Tokens Through Beacon appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
11 мая — день победы компьютера: от Deep Blue до наших дней
お知らせ:CyberNewsFlash「SonicWall製SMA100シリーズにおける複数の脆弱性(CVE-2023-44221、CVE-2024-38475)を組み合わせた攻撃について」
CVE-2020-8880 | Foxit Studio Photo 3.6.6.916 tif File out-of-bounds
CVE-2020-8881 | Foxit Studio Photo 3.6.6.916 tif File use after free
CVE-2019-4726 | IBM Sterling B2B Integrator Standard Edition up to 5.2.6.5 cross-site request forgery (XFDB-172363)
CVE-2020-8877 | Foxit Studio Photo 3.6.6.916 PSD File out-of-bounds
CVE-2020-8878 | Foxit Studio Photo 3.6.6.916 PSD File out-of-bounds write
CVE-2020-8879 | Foxit Studio Photo 3.6.6.916 PSD File out-of-bounds
CVE-2019-4596 | IBM Sterling B2B Integrator Standard Edition up to 5.2.6.5 Web UI cross site scripting (XFDB-167879)
GLP-1RA 大幅减少肥胖相关癌症风险
How to give better cybersecurity presentations (without sounding like a robot)
Most people think great presenters are born with natural talent. Luka Krejci, a presentation expert, disagrees. “They are called presentation skills. Skills, not talent,” he says. “Any skill, be it dancing, football, or presenting, can be developed only if you commit and practice.” So, the first step is obvious: Quit avoiding presentations. The more you do them, the better you’ll get. Content first, delivery second We tend to focus on the performance side of presenting: … More →
The post How to give better cybersecurity presentations (without sounding like a robot) appeared first on Help Net Security.
Deep Research без боли — теперь отчёты из ChatGPT можно сохранять быстро, удобно и красиво
CVE-2016-8812 | NVIDIA Graphics Driver up to 2.11.4.124/3.1.0.51 on Quadro/NVS/GeForce Kernel Mode Layer nvstreamkms.sys memory corruption (EDB-40660 / Nessus ID 94576)
PoC Code Published for Linux nftables Security Vulnerability
Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in Linux’s nftables firewall subsystem. The flaw allows local attackers to escalate privileges and execute arbitrary code, posing significant risks to unpatched systems. Technical Breakdown of CVE-2024-26809 nftables, the modern replacement for legacy iptables, manages network packet filtering through components like tables, sets, and rules. […]
The post PoC Code Published for Linux nftables Security Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.