Aggregator
CVE-2023-36348 | POS Codekop 2.0 filename authorization (ID 173278 / EDB-51551)
Detailing the Attack Surfaces of the WolfBox E40 EV Charger
Data brokers face sweeping new regulations from CFPB
Barrierefreiheit - Neues auf dem 38C3
CloudGoat Official Walkthrough Series: ‘sqs_flag_shop’
Linux Default User Password Attack Detection and Forensics
Cloud Console Cartographer: Mapping the Cloud for Defenders
Cloud Console Cartographer Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. CloudTrail logs) and mapping them to the original user...
The post Cloud Console Cartographer: Mapping the Cloud for Defenders appeared first on Penetration Testing Tools.
obfuscar: Open source obfuscation tool for .NET assemblies
Obfuscar Obfuscar is a basic obfuscator for .NET assemblies. It uses massive overloading to rename metadata in .NET assemblies (including the names of methods, properties, events, fields, types, and namespaces) to a minimal set,...
The post obfuscar: Open source obfuscation tool for .NET assemblies appeared first on Penetration Testing Tools.
attack range: create vulnerable instrumented local or cloud environments
Splunk Attack Range Purpose The Attack Range solves two main challenges in the development of detections. First, it allows the user to quickly build a small lab infrastructure as close as possible to your...
The post attack range: create vulnerable instrumented local or cloud environments appeared first on Penetration Testing Tools.
CVE-2008-0372 | 8e6 R3000 Internet Filter up to 2.0.05.32 access control (EDB-31031 / XFDB-39723)
Police seizes largest German online crime marketplace, arrests admin
CVE-2009-5029 | GNU C Library up to 2.14 __tzfile_read numeric error (Bug 761245 / EDB-36404)
CVE-2018-14533 | Inteno iopsys /tmp/etc/smb.conf read_tmp/write_tmp access control (EDB-45089)
There is no outlook mesages in Autopsy
CVE-2009-2108 | Git up to 1.6.0.2 resource management (EDB-33036 / Nessus ID 39509)
火山引擎论文入选国际会议ACM MM'24|对齐人类主观偏好的图像质量评价方法
Finland says latest fiber-optic cable break was an accident, not sabotage
European Police Disrupts Matrix Encrypted Service
French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.
16 Zero-Days Uncovered in Fuji Electric Monitoring Software
Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.