Aggregator
The ROI of Security Investments: How Cybersecurity Leaders Prove It
CVE-2014-0226 | Oracle Secure Global Desktop 4.63/4.71/5.0/5.1 mod_status mod_status.c lua_ap_scoreboard_worker race condition (EDB-34133 / Nessus ID 78331)
新型ZIP文件攻击技术针对Windows用户展开攻击
Researchers Detailed Credential Abuse Cycle
Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This can lead to data breaches, identity theft, and financial loss across diverse industries and geographic locations. Compromised credentials pose a significant security risk primarily due to data breaches and user negligence. In Q3 2024, they […]
The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2008-5220 | wPortfolio 0.2/0.3 File Upload input validation (EDB-7165 / XFDB-46745)
CVE-2008-6309 | W3matter AskPert index.php f[password] sql injection (EDB-7166 / XFDB-46732)
CVE-2008-6329 | Pre ASP Job Board Login sql injection (EDB-7164 / XFDB-46736)
CVE-2008-6936 | Joe Fuhrman Exodus 0.10 code injection (EDB-7167 / XFDB-52630)
CVE-2008-6952 | Cms.maury91 MauryCMS 0.53.2 Rss.php c sql injection (EDB-7162 / XFDB-46738)
CVE-2008-6310 | W3matter RevSense 1.0 index.php f[password] sql injection (EDB-7163 / XFDB-46733)
New Android Malware SpyAgent Taking Screenshots Of User’s Devices
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. By stealthily capturing screenshots, the malware bypasses traditional security measures that rely on text-based detection, which allows it to efficiently identify and exfiltrate sensitive information, posing a significant threat to cryptocurrency users. Cybercriminals are employing […]
The post New Android Malware SpyAgent Taking Screenshots Of User’s Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The post New Android Malware SpyAgent Taking Screenshots Of User’s Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Earth Estries: Trend Micro раскрывает виртуозные уловки хакеров-невидимок
CVE-2004-0270 | ClamAV 0.65 libclamav denial of service (EDB-23667 / Nessus ID 36576)
津沪闽京自贸区数据跨境流动清单管理制度研究
全面AI化!360入选权威机构“AI+安全”报告最多领域代表厂商
Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays
In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse complaints and temporary disruptions. While the attack affected non-exit relays and caused some relays to be taken offline, the overall impact on Tor users was limited. Tor directory authorities, relay operators, and the Tor Project sysadmin team began receiving numerous […]
The post Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The post Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.