Aggregator
区块链在网安领域的发展潜力是否被低估了?
9 months ago
区块链应用场景扩展,或将提供更安全高效的数据存储与传输解决方案。
Kill
9 months ago
cohenido
Kill
9 months ago
cohenido
Kill
9 months ago
cohenido
INC
9 months ago
cohenido
Kill
9 months ago
cohenido
Взлом изнутри: T-Mobile подвергся атаке через сеть партнёра
9 months ago
Источник угрозы оказался ближе, чем можно было предположить.
INC
9 months ago
cohenido
UK hospital network postpones procedures after cyberattack
9 months ago
Major UK healthcare provider Wirral University Teaching Hospital (WUTH), part of the NHS Foundation Trust, has suffered a cyberattack that caused a systems outage leading to postponing appointments and scheduled procedures. [...]
Bill Toulas
CVE-2004-2758 | Sun SunForum 3.2/3d 1.0 denial of service (VU#749342 / Nessus ID 23332)
9 months ago
A vulnerability was found in Sun SunForum 3.2/3d 1.0 and classified as critical. This issue affects some unknown processing. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2004-2758. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2003-1543 | Bajie Java HTTP Server 0.95zxc/0.95zxe Error Message QUERY_STRING Reflected cross site scripting (Nessus ID 10815 / XFDB-11687)
9 months ago
A vulnerability classified as problematic has been found in Bajie Java HTTP Server 0.95zxc/0.95zxe. This affects an unknown part of the component Error Message Handler. The manipulation of the argument QUERY_STRING leads to cross site scripting (Reflected).
This vulnerability is uniquely identified as CVE-2003-1543. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
工程中心获商用密码检测机构(商用密码应用安全性评估业务)资质
9 months ago
Shut Down Phishing Attacks -Detection & Prevention Checklist
9 months ago
In today’s interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as trustworthy entities, phishing attacks deceive users and organizations into divulging sensitive information, such as passwords, financial data, and personal details. Phishing attacks, among the most prevalent techniques cyber criminals employ, can be straightforward yet highly […]
The post Shut Down Phishing Attacks -Detection & Prevention Checklist appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cyber Writes
惊喜开班!系统0day安全-IOT设备漏洞挖掘(第6期)
9 months ago
录播+直播
动手实践,实现从0到1的跨越
索赔800万元!字节跳动前实习生因篡改代码并攻击大模型被起诉
9 months ago
字节跳动因前实习生篡改代码攻击内部模型训练系统,向法院提起诉讼,索赔800万元及公开道歉,以维护公司权益和声誉。
N1CTF-ezapk 解题思路
9 months ago
看雪论坛作者ID:SleepAlone
【漏洞通告】Zabbix 服务器SQL注入漏洞(CVE-2024-42327)
9 months ago
2024年11月28日,深瞳漏洞实验室监测到一则Zabbix组件存在SQL注入漏洞的信息,漏洞编号:CVE-2024-42327,漏洞威胁等级:严重。
Scams to look out for this holiday season
9 months ago
‘Tis the season to be wary – be on your guard and don’t let fraud ruin your shopping spree
CVE-2009-1614 | Gowondesigns Leap 0.1.4 searchterm cross site scripting (EDB-8577 / SA34943)
9 months ago
A vulnerability was found in Gowondesigns Leap 0.1.4. It has been classified as problematic. This affects an unknown part. The manipulation of the argument searchterm leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2009-1614. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com