Aggregator
国家计算机病毒应急处理中心监测发现12款违规移动应用
Google Play 上的 SpyLoan Android 恶意软件安装次数达 800 万次
Visual Studio Tunnels Abused For Stealthy Remote Access
In an attack campaign dubbed “Operation Digital Eye,” a suspected China-nexus threat actor has been observed targeting business-to-business IT service providers in Southern Europe. The attack operation lasted roughly three weeks, from late June to mid-July 2024. The intrusions could have allowed the attackers to gain a strategic foothold and compromise downstream entities. In particular, […]
The post Visual Studio Tunnels Abused For Stealthy Remote Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ИИ против разума: что тест ARC-AGI сказал о будущем
年轻人更可能死于高温
Versa Endpoint DLP prevents data exfiltration
Versa announced Versa Endpoint DLP, an integrated endpoint data loss prevention (DLP) capability delivered by the Versa SASE Client as part of the VersaONE Universal SASE Platform. The endpoint DLP feature provides the widest range of data exfiltration prevention capabilities in an integrated SASE solution, restricting copy/paste, screenshots, and peripheral device (e.g., USB storage) transfers based on Zero Trust attributes. Versa Endpoint DLP helps ensure that sensitive data residing on endpoints is safeguarded against accidental … More →
The post Versa Endpoint DLP prevents data exfiltration appeared first on Help Net Security.
‘Belangrijke rol veteranen voor weerbare samenleving’
«Лучше звоните PT ESC». Эпизод 4. Будни TI-аналитика: задачи, навыки и инструменты
CVE-2024-52538 | Dell Avamar up to 19.10SP1 sql injection (dsa-2024-489)
CVE-2024-47977 | Dell Avamar up to 19.10SP1 sql injection (dsa-2024-489)
CVE-2024-47484 | Dell Avamar up to 19.10SP1 sql injection (dsa-2024-489)
Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide
CVE-2024-11868 | LearnPress Plugin up to 4.2.7.3 on WordPress REST API information disclosure
How to become a ghost? Not literally ghost but like someone nobody knows about. Totally under the radar. To me I think pros are way heavier than cons about becoming ghost.
英伟达被立案调查;数据删除取代加密,新型勒索软件攻击或让企业面临更大风险 | 牛览
Scottish Parliament TV at Risk of Deepfake Attacks
《API安全技术应用指南(2024版)》报告发布
CVE-2011-1513 | e107 CMS 0.7.24 Installation install_.php os command injection (EDB-36252 / XFDB-70921)
Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623)
Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain access to organizations’ systems, Huntress researchers warned on Monday. “We’ve discovered at least 10 businesses whose Cleo servers were compromised with a notable uptick in exploitation observed on December 8 around 07:00 UTC. After some initial analysis, however, we have found evidence of exploitation as early as December 3,” they shared, and noted that there … More →
The post Attackers actively exploiting flaw(s) in Cleo file transfer software (CVE-2024-50623) appeared first on Help Net Security.