Aggregator
CVE-2023-31060 | Repetier Server up to 1.4.10 least privilege violation
CVE-2023-31061 | Repetier Server up to 1.4.10 cross-site request forgery
CVE-2023-31081 | Linux Kernel 6.2 vidtv_bridge.c vidtv_mux_stop_thread null pointer dereference
懒猫微服外挂虚拟机管理器 WebVirtCloud 启动方法说明
Nigeria Touts Cyber Success, Even as Cybercrime Rises in Africa
Тайна долголетия: «очеловеченные» мыши помогут победить старение
Устаревшие роутеры Zyxel превратились в бомбу замедленного действия
2024年勒索软件赎金支付额下降35%,总额达8.1355亿美元
JVN: ZF製RSSPlusにおける認証回避の脆弱性
Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access
The eSentire Threat Response Unit (TRU) revealed that threat actors are actively exploiting a six-year-old IIS vulnerability in Progress Telerik UI for ASP.NET AJAX to gain remote access to systems. This vulnerability, identified as CVE-2019-18935, allows attackers to execute arbitrary code on vulnerable servers, posing a significant risk to organizations that have not updated their […]
The post Hackers Exploiting A Six-Year-Old IIS Vulnerability To Gain Remote Access appeared first on Cyber Security News.
0-Day Vulnerabilities in Microsoft Sysinternals Tools Allow Attackers To Launch DLL Injection Attacks on Windows
A critical security vulnerability has been identified in nearly all Microsoft Sysinternals tools, presenting a significant risk to IT administrators and developers who rely on these utilities for system analysis and troubleshooting. This vulnerability, outlining how attackers can exploit DLL injection techniques to execute malicious code, has been meticulously researched, verified, and demonstrated in a […]
The post 0-Day Vulnerabilities in Microsoft Sysinternals Tools Allow Attackers To Launch DLL Injection Attacks on Windows appeared first on Cyber Security News.
波兰逮捕批准购买间谍软件 Pegasus 的前司法部长
3 Health Groups Report 2024 Hacks Affecting 1.2 Million
Three healthcare entities - including a California hospital and outpatient care provider, an Alabama cardiology practice, and a Colorado community health system, are notifying a total of more than 1.2 million individuals that their sensitive information was compromised in 2024 hacks.
Reimagining KYC to Meet Regulatory Scrutiny
Banks are struggling to keep up with evolving KYC expectations. Despite efforts to modernize, outdated processes continue to leave compliance gaps, leading to increased regulatory action. Penalties for financial institutions surged with KYC-related fines more than doubling to $51 million.
FSF 将在下月拍卖纪念品
Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access
A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam backup solutions. This flaw enables attackers to execute arbitrary code on affected servers through a Man-in-the-Middle (MitM) attack, potentially granting root-level permissions. The vulnerability has been assigned a severity score of 9.0, underscoring its significant […]
The post Critical Veeam Backup Vulnerability Let Attackers Execute Arbitrary Code to Gain Root Access appeared first on Cyber Security News.
CISA Releases Guidance to Protect Firewalls, Routers, & Internet-Facing Servers
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with international cybersecurity authorities, has issued comprehensive guidance aimed at securing network edge devices. These devices, which include firewalls, routers, VPN gateways, Internet of Things (IoT) devices, internet-facing servers, and operational technology (OT) systems, are critical to maintaining the security and integrity of enterprise networks. The […]
The post CISA Releases Guidance to Protect Firewalls, Routers, & Internet-Facing Servers appeared first on Cyber Security News.