Aggregator
CVE-2023-30330 | SoftExpert Excellence Suite up to 2.1.2 defaultframe_filter.php file inclusion (Exploit 51404 / EDB-51404)
December Zero-Day Phishing Threat Intel
WEB前端逆向拦截页面跳转
Rhysida
From Shopping Malls to Living Arcades: A Full-Circle Journey Into Modern Arcadism
绿盟科技威胁周报(2024.12.02-2024.12.08)
Cybersecurity Products or Platforms – Which is More Effective?
Understanding the nuances between cybersecurity products and platforms is crucial for enhancing business protections and supporting businesses anywhere.
The post Cybersecurity Products or Platforms – Which is More Effective? appeared first on Security Boulevard.
Strengthening Cybersecurity: Breaking Down inDrive’s Bug Bounty Program
«Do Not Track» уходит в историю: Mozilla выбирает другое решение
Analysis of Nova: A Snake Keylogger Fork
Editor’s note: The current article is authored by Mostafa ElSheimy, a malware reverse engineer and threat intelligence analyst. You can find Mostafa on X and LinkedIn. In this malware analysis report, we will delve into Nova, a newly discovered fork of the Snake Keylogger family. This variant has been observed employing even more sophisticated tactics, signaling the continued […]
The post Analysis of Nova: A Snake Keylogger Fork appeared first on ANY.RUN's Cybersecurity Blog.
CVE-2024-8602 | Schweizerische Steuerkonferenz Library taxstatement.jar 2.2.2/2.2.4 on Windows PDF DocumentBuilder xml external entity reference
CVE-2024-55655 | sigstore-python up to 3.5.x Integration Time missing cryptographic step (GHSA-hhfg-fwrw-87w7)
[下载] Mozilla Firefox v133.0.3修复版本发布 修复部分界面没滚动条问题
Ivanti CSA Vulnerabilities Let Attackers Gain Admin Access
Ivanti has issued critical software updates to address several severe vulnerabilities in its Cloud Services Application (CSA). These vulnerabilities tracked as CVE-2024-11639, CVE-2024-11772, and CVE-2024-11773, affect CSA versions 5.0.2 and earlier. Without mitigation, these flaws could allow malicious attackers to bypass authentication, execute remote code, and manipulate databases, posing significant risks to organizations relying on […]
The post Ivanti CSA Vulnerabilities Let Attackers Gain Admin Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025
One of the most significant regulatory mandates on the horizon is the European Union’s Digital Operational Resilience Act (DORA).
The post Leveraging Crypto Agility to Meet DORA Requirements in Financial Services by January 2025 appeared first on Security Boulevard.