Aggregator
Submit #639745: 北京宏景世纪软件股份有限公司 宏景HCM人力资源管理系统 未知 Use of Java I/O [Accepted]
Submit #639709: CMS Made Simple 2.2.22 Remote Code Execution [Duplicate]
Sen. King: Cyber domain is a ‘hellscape’ that will be made worse by cuts
US charges admin of LockerGoga, MegaCortex, Nefilim ransomware
Submit #639041: Seismic Software seismic(com.seismic.doccenter) 2.4.2 Task Hijacking [Accepted]
Submit #637921: ZhenShi Information Technology (Shanghai) Co., Ltd Mibro Fit(com.xiaoxun.xunoversea.mibrofit) 1.6.3.17499 Task Hijacking [Accepted]
Submit #636882: China Shanghai Lingdang Information Technology Lingdang CRM <= V8.6.5.4 Server-Side Request Forgery [Accepted]
Google 同意在韩国对敏感卫星地图进行模糊处理
Zero Trust's Next Phase: Agility, Identity, AI Risks
Zero trust is evolving beyond static controls and network segmentation. CISOs must prepare for dynamic, behavior-driven security models that incorporate real-time intelligence, enforce identity and data safeguards, and manage AI as both a threat vector and a security tool.
SecWiki News 2025-09-09 Review
更多最新文章,请访问SecWiki
Adobe patches critical SessionReaper flaw in Magento eCommerce platform
Salty2FA Takes Phishing Kits to Enterprise Level
New Salty2FA Phishing Kit Bypasses MFA and Clones Login Pages
Intern Spotlight: Riding the Connected World
Riding the AI Revolution
FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands
Fortinet has disclosed a significant OS command injection vulnerability in its FortiDDoS-F appliances that could allow privileged attackers to execute unauthorized code or commands through the command-line interface (CLI). The security flaw, identified as CVE-2024-45325, affects multiple versions of the FortiDDoS-F product line and carries a CVSS 3.1 score of 6.5, indicating medium severity. Vulnerability Details […]
The post FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
空气污染增加路易体痴呆症风险
Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure
Salat Stealer has emerged as a pervasive threat targeting Windows endpoints with a focus on harvesting browser-stored credentials and cryptocurrency wallet data. First detected in August 2025, this Go-based infostealer leverages a range of evasion tactics, including UPX packing and process masquerading, to slip past conventional defenses. Its operators advertise the malware through social engineering […]
The post Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure appeared first on Cyber Security News.
FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands
Fortinet has disclosed a medium-severity vulnerability in its FortiDDoS-F product line that could allow a privileged attacker to execute unauthorized commands. Tracked as CVE-2024-45325, the flaw is an OS command injection vulnerability residing within the product’s command-line interface (CLI). The vulnerability, identified as CWE-78, stems from an improper neutralization of special elements used in an […]
The post FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands appeared first on Cyber Security News.