Aggregator
安全运营 | “纵深防护·极智运营”北京站·第十期「度安讲」 技术沙龙开放报名
安全运营 | “纵深防护·极智运营”北京站·第十期「度安讲」 技术沙龙开放报名
安全运营 | “纵深防护·极智运营”北京站·第十期「度安讲」 技术沙龙开放报名
安全运营 | “纵深防护·极智运营”北京站·第十期「度安讲」 技术沙龙开放报名
安全运营 | “纵深防护·极智运营”北京站·第十期「度安讲」 技术沙龙开放报名
Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code
A severe vulnerability in Synology’s DiskStation Manager (DSM) allows remote attackers to execute arbitrary code with no user interaction. The flaw, disclosed during PWN2OWN 2024, received a Critical severity rating with a CVSS score of 9.8, indicating its potential for widespread exploitation. The primary vulnerability, identified as CVE-2024-10441, stems from improper encoding or escaping of […]
The post Critical Synology Vulnerability Let Attackers Remote Execute Arbitrary Code appeared first on Cyber Security News.
CVE-2025-27018 | Apache Airflow MySQL Provider up to 6.1.x sql injection
CVE-2024-12137 | Elfatek Elektronics ANKA JPD-00028 up to 19.03.2025 authentication replay
CVE-2024-12136 | Elfatek Elektronics ANKA JPD-00028 up to 19.03.2025 missing critical step in authentication
幽灵注入(Ghost Injection)
Полная остановка госуслуг: власти оказались заложниками хакеров
TXOne Networks Stellar 3.2 helps organizations make informed security choices
TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection and response in operational technology (OT) environments. Stellar simplifies the journey into threat hunting and detection while overcoming the limitations of traditional information technology (IT) endpoint detection and response (EDR) solutions, which can disrupt OT operations and productivity. Purpose-built for OT environments, Stellar ensures effective security without compromising system stability. “We have observed that alert … More →
The post TXOne Networks Stellar 3.2 helps organizations make informed security choices appeared first on Help Net Security.
10 из 10: CVE-2024-54085 испепеляет дата-центры удалённой командой
Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC Released
A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user interaction beyond simply extracting a compressed file. Security researchers have released a proof-of-concept exploit demonstrating this high-severity flaw, which Microsoft patched in its March 2025 updates. Microsoft Windows File Explorer Vulnerability The vulnerability, dubbed “NTLM […]
The post Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC Released appeared first on Cyber Security News.
Hackers Allegedly Selling Firewall Access to Canon Inc on Hacking Forums
Threat actors are allegedly offering root access to Canon Inc.’s internal firewall systems on underground hacking forums. According to security monitoring firm ThreatMon, the advertisement appeared on a popular dark web marketplace, claiming to provide administrator-level access to the Japanese camera giant’s network infrastructure. The threat actor’s listing, verified by multiple security analysts, advertises privileged […]
The post Hackers Allegedly Selling Firewall Access to Canon Inc on Hacking Forums appeared first on Cyber Security News.
CVE-2024-13790 | ThemeMove MinimogWP Plugin up to 3.7.0 on WordPress template filename control
Keysight AI Insight Brokers accelerates threat detection and response
Keysight Technologies announces the expansion of its Keysight Vision Network Packet Brokers (NPBs), with the introduction of AI Insight Brokers. These enhanced NPBs are designed to improve the performance of AI-driven cybersecurity operations such as threat detection, incident response, and forensics. The AI Insight Broker is purpose built to support and leverage the capabilities of AI software, including Keysight’s newly developed AI Stack. As cyber threats continue to evolve, organizations need to look for new … More →
The post Keysight AI Insight Brokers accelerates threat detection and response appeared first on Help Net Security.