Aggregator
击穿星巴克获取 1 亿用户详细信息
11 months ago
背景 有一种攻击叫做: 次级上下文穿越攻击, 也许单听名字你不理解这是怎么样一种攻击。但是下面我将用星巴克被攻陷的一个真实案例来跟你介绍这种巧妙的攻击方式以及它给我带来了怎么样的思考!正文 在尝试了一
击穿星巴克获取 1 亿用户详细信息
11 months ago
有一种攻击叫做: 次级上下文穿越攻击。
Manchester Law Firm Leads 15,000 to Sue Google and Microsoft over AI Data
11 months ago
Barings Law is planning to sue the two tech giants over numerous alleged violations of data misuse, including for AI training
Best course for beginner in hacking and cyber security
11 months ago
CVE-2024-47100 | Siemens SIMATIC S7-1200 CPU 1211C AC up to 4.6 Web Interface cross-site request forgery (ssa-717113)
11 months ago
A vulnerability was found in Siemens SIMATIC S7-1200 CPU 1211C AC, DC, Rly, SIMATIC S7-1200 CPU 1211C DC, SIMATIC S7-1200 CPU 1212C AC, SIMATIC S7-1200 CPU 1212C DC, SIMATIC S7-1200 CPU 1212FC DC, SIMATIC S7-1200 CPU 1214C AC, SIMATIC S7-1200 CPU 1214C DC, SIMATIC S7-1200 CPU 1214FC DC, SIMATIC S7-1200 CPU 1215C AC, SIMATIC S7-1200 CPU 1215C DC, SIMATIC S7-1200 CPU 1215FC DC, SIMATIC S7-1200 CPU 1217C DC, SIPLUS S7-1200 CPU 1212 AC, RLY, SIPLUS S7-1200 CPU 1212 DC, SIPLUS S7-1200 CPU 1212C DC, DC RAIL, SIPLUS S7-1200 CPU 1214 AC, SIPLUS S7-1200 CPU 1214 DC, SIPLUS S7-1200 CPU 1214C DC, SIPLUS S7-1200 CPU 1214FC DC, SIPLUS S7-1200 CPU 1215 AC, SIPLUS S7-1200 CPU 1215 DC, SIPLUS S7-1200 CPU 1215C DC and SIPLUS S7-1200 CPU 1215FC DC up to 4.6. It has been classified as problematic. This affects an unknown part of the component Web Interface. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-47100. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-45385 | Siemens Industrial Edge Management OS cross site scripting (ssa-416411)
11 months ago
A vulnerability was found in Siemens Industrial Edge Management OS and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-45385. The attack may be launched remotely. There is no exploit available.
vuldb.com
Insurance company accused of using secret software to illegally collect and sell location data on millions of Americans
11 months ago
Insurance company Allstate and its subsidiary Arity unlawfully collecte
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
11 months ago
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
A new campaign is likely targeting a zero-day in Fortinet FortiGate firewalls
11 months ago
Experts warn of a new campaign targeting an alleged zero-day in Fortinet FortiGate firewalls with management interfaces exposed online. Arctic Wolf researchers observed a campaign targeting Fortinet FortiGate firewalls with exposed management interfaces, likely exploiting a zero-day vulnerability. Threat actors gained unauthorized access to network devices, created accounts, and modified configurations. Experts urge organizations to […]
Pierluigi Paganini
Threat Brief: Y2Q and the Convergence of AI Compute and Quantum Computing Power
11 months ago
OverviewY2Q, shorthand for “Year to Quantum” – marks the critical point when quantum compute
CVE-2024-56841 | Siemens Mendix LDAP up to 1.1.1 ldap injection (ssa-314390)
11 months ago
A vulnerability has been found in Siemens Mendix LDAP up to 1.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to ldap injection.
This vulnerability is known as CVE-2024-56841. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Products and people are in place for CISA to succeed, agency’s departing No. 2 official says
11 months ago
Nitin Natarajan joined the Cybersecurity and Infrastructure Security Agency (CISA) in the early day
X и TikTok: появится ли новая медиа-империя Маска?
11 months ago
Китай и США ведут сложные переговоры.
Qilin
11 months ago
cohenido
8Base
11 months ago
cohenido
Threat Intelligence Pivoting: Actionable Insights Behind Indicators
11 months ago
Pivoting in cyber thre
Akira
11 months ago
cohenido
Akira
11 months ago
cohenido
Akira
11 months ago
cohenido