Aggregator
CVE-2019-0227 | Oracle Secure Global Desktop 5.4/5.5 Web Services server-side request forgery (EDB-46682)
Найм в 2025 году: интервью прошёл дипфейк, работает ИИ — зарплату получает КНДР
Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords
A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000 users. The group, which has previously made waves in the hacking community with bold claims—often with little substantiated evidence—has taken to underground forums to boast about their latest exploit. Alleged Account Deletions and Data Leak […]
The post Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data
As cloud environments become more complex, ensuring robust security for your cloud infrastructure is no longer an option, but a necessity.
The post Cloud Infrastructure Security: Threats, Challenges & How to Protect Your Data appeared first on Security Boulevard.
CVE-2023-36346 | POS Codekop 2.0 print.php nm_member cross site scripting (ID 173280 / EDB-51549)
CVE-2023-33580 | PHPGurukul Student Study Center Management System 1.0 Admin Profile Page Admin Name cross site scripting (ID 173030 / EDB-51528)
CVE-2023-28362 | actionpack Gem on Ruby redirect_to cross site scripting (Nessus ID 232154)
Microsoft announces fix for CPU spikes when typing in Outlook
CVE-2023-2908 | LibTIFF tif_dir.c null pointer dereference (Nessus ID 214399)
CVE-2023-25433 | LibTIFF 4.5.0 /tools/tiffcrop.c rotateImage heap-based overflow (Issue 520 / Nessus ID 214399)
CVE-2023-26966 | LibTIFF 4.5.0 uv_encode buffer overflow (Issue 530 / Nessus ID 214399)
CVE-2023-22815 | Western Digital My Cloud OS up to 5.26.202 CGI File command injection
Detectify Asset Classification and Scan Recommendations improves vulnerability testing
Detectify announced new Asset Classification and Scan Recommendations capabilities. This innovation directly addresses a critical challenge for security teams: knowing what else, beyond their core applications, requires in-depth testing. The new features automatically classify discovered web assets based on attacker reconnaissance techniques and deliver recommendations on where to run DAST, helping organizations bridge the gap between broad and deep vulnerability testing across their entire attack surface. Security teams know they must test their main applications, … More →
The post Detectify Asset Classification and Scan Recommendations improves vulnerability testing appeared first on Help Net Security.
新 Android 间谍软件瞄准俄罗斯前线军人
FBI Offers $10 Million Reward for information on Salt Typhoon Hackers
The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State, has announced a reward of up to $10 million for information leading to the identification or location of individuals connected to the recent “Salt Typhoon” cyberattacks. The campaign, which is believed to be linked to actors affiliated with the People’s Republic […]
The post FBI Offers $10 Million Reward for information on Salt Typhoon Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.