Aggregator
Desertstorm Claims to have Leaked FTP Access of Radio Rencontre
Top Cyber Attacker Techniques, August–October 2024
DEF CON 32 – The Rise and Fall of Binary Exploitation
Authors/Presenters: Stephen Sims
Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – The Rise and Fall of Binary Exploitation appeared first on Security Boulevard.
Cloudflare incident on November 14, 2024, resulting in lost logs
CVE-2009-4612 | Mortbay Jetty up to 6.1.21 cross site scripting (EDB-9887 / Nessus ID 44320)
SecWiki News 2024-11-26 Review
Chrome扩展攻击指南(三):全局视角 by tmr
Chrome扩展攻击指南(二):漏洞分析 by tmr
Chrome扩展攻击指南(一):基础知识 by tmr
更多最新文章,请访问SecWiki
Fog
Kill
勒索软件忙招人,2024 年网络安全五大新趋势
勒索软件袭击供应链管理公司 Blue Yonder,导致客户配送系统中断
Supply Chain Ransomware Attack Hits Starbucks, UK Grocers
Coffee store giant Starbucks was among other organizations affected by a ransomware attack this month on cloud managed service provider Blue Yonder, a Panasonic subsidiary that has more than 3,000 customers. Two UK grocery chains also were impacted.
The post Supply Chain Ransomware Attack Hits Starbucks, UK Grocers appeared first on Security Boulevard.
Lazarus Group 利用带有 “RustyAttr” 的 xattr 来逃避检测
PyPI Python 库“aiocpa”发现通过 Telegram Bot 泄露加密密钥
Researchers reveal exploitable flaws in corporate VPN clients
Researchers have discovered vulnerabilities in the update process of Palo Alto Networks (CVE-2024-5921) and SonicWall (CVE-2024-29014) corporate VPN clients that could be exploited to remotely execute code on users’ devices. CVE-2024-5921 CVE-2024-5921 affects various versions of Palo Alto’s GlobalProtect App on Windows, macOS and Linux, and stems from insufficient certification validation. It enables attackers to connect the GlobalProtect app to arbitrary servers, the company confirmed, and noted that this may result in attackers installing malicious … More →
The post Researchers reveal exploitable flaws in corporate VPN clients appeared first on Help Net Security.
恶意软件滥用有缺陷的 Avast Anti-Rootkit 驱动程序
微软又全球宕机 11 小时,多项核心服务无法使用
The Elephant in AppSec Talks Highlight: Shifting Left Doesn’t Mean Anything Anymore
Discover key highlights from Tanya Janca's talk at The Elephant in AppSec Conference on shifting security to be present throughout the entire Software Development Lifecycle.
The post The Elephant in AppSec Talks Highlight: Shifting Left Doesn’t Mean Anything Anymore appeared first on Security Boulevard.
Secure Workload Access in Minutes with Aembit’s New QuickStart Guide
3 min readThis step-by-step resource helps you deploy workloads, configure policies, and explore Aembit’s approach to securing non-human identities.
The post Secure Workload Access in Minutes with Aembit’s New QuickStart Guide appeared first on Aembit.
The post Secure Workload Access in Minutes with Aembit’s New QuickStart Guide appeared first on Security Boulevard.