Aggregator
H100 算力价格暴跌 75%,对 AI 创业公司意味什么?
CVE-2023-6728 | Nokia 7250 IXR 24 bof.cfg inadequate encryption
CVE-2014-7753 | Circa News 2.1.3 X.509 Certificate cryptographic issues (VU#582497)
CVE-2016-6960 | Adobe Acrobat Reader up to 11.0.17/15.006.30201/15.017.20053 memory corruption (APSB16-33 / Nessus ID 94074)
CVE-2014-7752 | NASIOC 3.8.0 X.509 Certificate cryptographic issues (VU#582497)
Законопроект об утечках данных: между защитой граждан и интересами бизнеса
The Newest PSR Protections
What Organizations Should Know The PSR establishes economic regulations in the UK for payment systems. With APP scams (Authorised Push Payment scams) on the rise, the PSR has introduced groundbreaking new protections to combat fraud and protect consumers. These latest PSR regulations include a significant refund limit of £85,000 for victims, making fraud prevention more necessary […]
The post The Newest PSR Protections appeared first on Security Boulevard.
CVE-2024-8920 | Fonto Plugin up to 1.2.1 on WordPress SVG File Upload cross site scripting
CVE-2024-3187 | EmbedThis GoAhead up to 6.0.0 JST Value use after free
CVE-2024-3184 | EmbedThis GoAhead up to 6.0.0 Request null pointer dereference
CVE-2024-3186 | EmbedThis GoAhead up to 6.0.0 Javascript Template evalExpr null pointer dereference
Иранские хакеры обрушили лавину Push-атак на иностранные ведомства
CVE-2024-9213 | Persian WooCommerce SMS Plugin up to 7.0.2 on WordPress cross site scripting
CVE-2024-9352 | Forminator Forms Plugin up to 1.35.1 on WordPress Draft Custom Forms cross-site request forgery
CVE-2024-9898 | Parallax Image Plugin up to 1.8 on WordPress Shortcode dd-parallax cross site scripting
CVE-2024-9184 | SendPulse Free Web Push Plugin up to 1.3.6 on WordPress cross site scripting
CVE-2024-10068 | OpenSight Software FlashFXP 5.4.0.3970 FlashFXP.exe uncontrolled search path
RansomHub
MFA Compromise: The Mechanics Behind This Escalating Threat Vector
Multi-factor authentication (MFA) was once perceived as a powerful defense tactic – a silver bullet that made your organization more secure. But attackers have quickly adapted and found ways to compromise it, and it’s now a preferred attack vector for adversaries. So what happens when the defenses your enterprise depends on for protection can’t stop […]
The post MFA Compromise: The Mechanics Behind This Escalating Threat Vector appeared first on Security Boulevard.