Aggregator
Sandfly 5.2 - Linux Stealth Rootkit File and Directory De-Cloaking
CVE-2014-7467 | magzter HoneyBee Mag 3 X.509 Certificate cryptographic issues (VU#582497)
Келлская книга: загадочная рукопись из средневековья теперь доступна онлайн
Linux systems targeted with stealthy “Perfctl” cryptomining malware
Thousands of Linux systems are likely infected with the highly elusive and persistent “perfctl” (or “perfcc“) cryptomining malware and many others still could be at risk of getting compromised, Aqua Security researchers revealed last week. “In all the attacks observed, the malware was used to run a cryptominer, and in some cases, we also detected the execution of proxy-jacking software,” they shared. “Perfctl” malware Though the actual cryptomining is performed by XMRIG Monero cryptomining software, … More →
The post Linux systems targeted with stealthy “Perfctl” cryptomining malware appeared first on Help Net Security.
CVE-2017-8687 | Microsoft Windows up to Server 2016 Kernel Win32k win32k!NtGdiDoBanding information disclosure (KB4038792 / EDB-42749)
CVE-2007-5272 | Furkan Tastan Blog kategori.asp id sql injection (EDB-4486 / XFDB-36971)
CVE-2007-5298 | Creamotion CMS 5.0/6.0 Administration securite.php cfg[document_uri] code injection (EDB-4491 / XFDB-36989)
CVE-2007-5271 | Trionic Cite CMS up to 1.2_rev9 bField[bf_data] code injection (EDB-4485 / XFDB-36972)
CVE-2007-5221 | Poppawid 2.7 childwindow.inc.php code injection (EDB-4481 / XFDB-36922)
CVE-2007-5233 | Deonixscripts Web Template Management System 1.3 index.php id sql injection (EDB-4482 / XFDB-36948)
CVE-2007-5234 | Ossigeno 2.2 Alpha3 level code injection (EDB-4483 / XFDB-36949)
CVE-2007-5256 | Mcdu FSD 2.052 D9/3.000 D9 Help Function sysuser.cc sysuser::exechelp memory corruption (EDB-4484 / BID-25883)
CVE-2007-5261 | iScripts MultiCart 1.0 categorydetail.php ddlCategory sql injection (EDB-4480 / XFDB-36927)
CVE-2017-8686 | Microsoft Windows Server 2012/Server 2012 R2/Server 2016 DHCP Service memory corruption (KB4038792 / Nessus ID 103128)
GPU орган: ИИ делает музыку из кода и воздуха
2024高校网络安全管理运维赛 wp - 渗透测试中心
2024熵密杯wp - 渗透测试中心
New PhantomLoader Malware Distributes SSLoad: Technical Analysis
Editor’s note: The current article is authored by Mohamed Talaat, a cybersecurity researcher and malware analyst. You can find Mohamed on X and LinkedIn. In this malware analysis report, we take an in-depth look at how an undocumented loader called PhantomLoader has been used by attackers to distribute a rust-based malware known as SSLoad. Overview The PhantomLoader usually […]
The post New PhantomLoader Malware Distributes SSLoad: Technical Analysis appeared first on ANY.RUN's Cybersecurity Blog.