Aggregator
CVE-2024-2783 | GamiPress Plugin up to 6.9.0 on WordPress Shortcode cross site scripting
CVE-2024-28233 | JupyterHub up to 4.0.x cross site scripting
CVE-2024-2111 | Events Manager Plugin up to 6.4.7.1 on WordPress cross site scripting
CVE-2024-29891 | Zitadel up to 2.48.2 Avatar Image unrestricted upload (GHSA-hr5w-cwwq-2v4m)
Multi-SWE-bench:首个多语言代码修复基准开源
Ransomware Hackers Target Active Directory Domain Controllers
Ransomware hackers are hitting up Active Directory domain controllers to boost privileges within compromised networks, warns Microsoft. Nearly eight out of every 10 human-operated cyberattacks involve a breached domain controller. Securing the servers is a challenge.
Clean Up от Apple: теперь на фото только "хорошие" люди
CVE-2024-11859
Angr符号执行练习Auto Rop Generation
Angr符号执行练习Auto Rop Generation
Ransomware Hackers Target Active Directory Domain Controllers
Ransomware hackers are hitting up Active Directory domain controllers to boost privileges within compromised networks, warns Microsoft. Nearly eight out of every 10 human-operated cyberattacks involve a breached domain controller. Securing the servers is a challenge.
Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows
Google has announced the launch of Agent2Agent Protocol (A2A), a groundbreaking open protocol designed to enable AI agents to communicate with each other, securely exchange information, and coordinate actions across enterprise platforms. Revealed on April 9, 2025, the protocol marks a significant advancement in agent interoperability, with support and contributions from more than 50 technology […]
The post Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows appeared first on Cyber Security News.
Hackers Actively Exploit Patched Fortinet FortiGate Devices to Gain Root Access Using Symbolic Link
Fortinet has uncovered a sophisticated post-exploitation technique used by a threat actor to maintain unauthorized access to FortiGate devices, even after initial vulnerabilities were patched. The discovery, detailed in a recent Fortinet investigation, highlights the persistent risks of unpatched systems and underscores the company’s commitment to responsible transparency and rapid response. According to Fortinet’s findings, […]
The post Hackers Actively Exploit Patched Fortinet FortiGate Devices to Gain Root Access Using Symbolic Link appeared first on Cyber Security News.
Weekly Update 447
I'm home! Well, for a day, then it's off to the other side of the country (which I just flew over last night on the way back from Dublin 🤦♂️) for an event at the Microsoft Accelerator in Perth on Monday. Such is
Lynx
Active Directory Attack Kill Chain Checklist & Tools List- 2025
The “Active Directory Kill Chain Attack & Defense” concept is a structured approach to understanding the sequence of events or stages involved in an Active Directory (AD) attack and the corresponding defensive measures to counteract or prevent such attacks. Microsoft developed the service Active Directory for Windows domain networks for user and resource management in […]
The post Active Directory Attack Kill Chain Checklist & Tools List- 2025 appeared first on Cyber Security News.