Aggregator
CVE-2022-3688 | WPQA Builder Plugin up to 5.8 on WordPress cross-site request forgery
CVE-2022-3690 | Popup Maker Plugin up to 1.16.10 on WordPress cross site scripting
CVE-2022-3634 | Contact Form 7 Database Addon Plugin up to 1.2.6.4 on WordPress csv injection
CVE-2022-44156 | Tenda AC15 15.03.05.19 formSetIpMacBind buffer overflow
CVE-2022-44158 | Tenda AC21 16.03.08.15 set_device_name buffer overflow
CVE-2022-45012 | WBCE CMS 1.5.4 Modify Page Module Source cross site scripting
CVE-2022-45013 | WBCE CMS 1.5.4 Show Advanced Option Module Section Header cross site scripting
CVE-2022-45014 | WBCE CMS 1.5.4 Search Settings Module Results Header cross site scripting
CVE-2022-45015 | WBCE CMS 1.5.4 Search Settings Module Results Footer cross site scripting
CVE-2022-45016 | WBCE CMS 1.5.4 Search Settings Module Footer cross site scripting
CVE-2022-45017 | WBCE CMS 1.5.4 Overview Page Settings Module Post Loop cross site scripting (Issue 525)
SentinelOne warns of threat actors targeting its systems and high-value clients
Скоро в Windows: платная кнопка "Пуск", встроенный ИИ-астролог и реклама микрозаймов
Understanding RTO/RPO & Why They’re Not Enough
The post Understanding RTO/RPO & Why They’re Not Enough appeared first on Votiro.
The post Understanding RTO/RPO & Why They’re Not Enough appeared first on Security Boulevard.
From Mission-Centric to People-Centric: Competitive Leadership in Cyber
Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories
Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell command-and-control (C2) payloads and a Linux ELF Cobalt Strike beacon. The discovery, originating from a routine search for open-source proxy software, highlights the pervasive risks of unsecured infrastructure and the sophistication of modern cyber threats. Hunt’s continuous scanning of public IPv4 […]
The post Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
44% of the zero-days exploited in 2024 were in enterprise solutions
In 2024, threat actors exploited 75 zero-days – i.e., vulnerabilities previously unknown to vendors, thus without a readily available patch – in a wide variety of attacks. Of these, 33 vulnerabilities (44%) affected enterprise solutions, which is up from 37% in 2023, according to Google Threat Intelligence Group researchers. “Zero-day vulnerabilities in security software and appliances were a high-value target in 2024. We identified 20 security and networking vulnerabilities, which was over 60% of all … More →
The post 44% of the zero-days exploited in 2024 were in enterprise solutions appeared first on Help Net Security.
Молодой учёный 30 лет назад нашёл странность в гравитационных волнах. Его никто не понял. Сегодня он оказался прав
Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software
A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest Uyghur diaspora organization, using a weaponized version of UyghurEditPP-a trusted open-source Uyghur language text editor. This incident exemplifies the technical evolution of digital transnational repression and the exploitation of cultural software by state-aligned threat actors, likely linked to the Chinese government. […]
The post Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.