Aggregator
CVE-2024-11522 | IrfanView DXF File Parser memory corruption (ZDI-24-1590)
CVE-2024-11528 | IrfanView DXF File Parser memory corruption (ZDI-24-1589)
CVE-2024-11538 | IrfanView DXF File Parser memory corruption (ZDI-24-1588)
Cicada3301
Cicada3301
Cicada3301
Cicada3301
[Meachines] [Easy] Secret DUMB Docs .Git Leak+JWT+RCE+TRP00F权限提升+prctl函数转存储权限提升
Mr Hamza Targeted the Website of Ministry of Defence of Bosnia and Herzegovina
A Threat Actor Claims to have Leaked the Data of FM Logistic
Ddarknotevil Claims to have Leaked the Data of Al Hilal Saudi Football Club
The Bybit Incident: When Research Meets Reality
Research by Dikla Barda, Roman Ziakin and Oded Vanunu On February 21st, Check Point Blockchain Threat Intel System alerted on a critical attack log on the Ethereum blockchain network. The log indicated that the AI engine identify anomality change with this transaction and categorize it as critical attack in real time. It was indicated that […]
The post The Bybit Incident: When Research Meets Reality appeared first on Check Point Research.
RansomHub
DEF CON 32 – Efficient Bug Bounty Automation Techniques
Author/Presenter: Gunnar Andrews
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Efficient Bug Bounty Automation Techniques appeared first on Security Boulevard.