Aggregator
CVE-2012-0127 | HP Performance Manager 9.00 memory corruption (XFDB-74406 / BID-52749)
CVE-2012-0253 | Demandmedia Pluck SiteLife up to 5.0.11 cb cross site scripting (VU#400619 / XFDB-74805)
CVE-2012-1788 | wonderdesk WonderDesk SQL 4.14 wonderdesk.cgi cus_email cross site scripting (XFDB-73502 / BID-52193)
CVE-2012-1843 | Dell Powervault Ml6020 prior 14u saveRestore.htm fileName cross-site request forgery (VU#913483 / XFDB-74161)
【AI报告】生物安全与恐怖主义研究报告
ASUS releases fix for AMI bug that lets hackers brick servers
紧急!ViPNet 网络漏洞致政企核心数据面临全面失窃风险
From Stranded to Supported: Helping My Customers Land Safely with FireMon
When Skybox Security shut down, it raised real concerns for me, not just about employment, but about how the situation could affect the professional credibility I’ve built over nearly 25...
The post From Stranded to Supported: Helping My Customers Land Safely with FireMon appeared first on Security Boulevard.
Magecart 攻击升级:电商平台支付信息遭高度混淆代码窃取
Hackers Weaponized Google Forms to Evade Email Security & Steal Logins
Google Forms, the tech giant’s widely used survey tool, has become a favored weapon in cybercriminals’ arsenal. It enables them to bypass sophisticated email security filters and harvest sensitive credentials. Security researchers have identified a surge in attacks that leverage this trusted platform to create convincing phishing campaigns that exploit users’ inherent trust in Google’s […]
The post Hackers Weaponized Google Forms to Evade Email Security & Steal Logins appeared first on Cyber Security News.
FBI Reveals “Staggering” $16.6bn Lost to Cybercrime in 2024
Cybersecurity metrics that matter (and how to measure them)
CVE-2024-10095
警惕!恶意 npm 包利用 Telegram 窃取 Linux 开发人员数据
CVE-2025-43716 | Ivanti LANDesk Management Suite up to 4.2-1.9 /client/index.php incorrect behavior order: validate before canonicalize
Synology Network File System Vulnerability Let Read Any File
A severe security vulnerability in Synology’s DiskStation Manager (DSM) software has been identified. This vulnerability allows remote attackers to read arbitrary files through the Network File System (NFS) service without proper authorization. The vulnerability, tracked as CVE-2025-1021 and detailed in a security advisory, was resolved in recent updates and affects multiple versions of the popular […]
The post Synology Network File System Vulnerability Let Read Any File appeared first on Cyber Security News.
Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds
Significant vulnerabilities in popular browser-based cryptocurrency wallets enable attackers to steal funds without any user interaction or approval. These critical flaws, discovered in wallets including Stellar Freighter, Frontier Wallet, and Coin98, represent a significant shift in attack vectors against crypto users. Unlike traditional phishing attacks that require users to approve malicious transactions, these vulnerabilities allow […]
The post Critical Vulnerabilities in Browser Wallets Let Attackers Drain your Funds appeared first on Cyber Security News.
警惕!SVG 附件钓鱼攻击威胁登录数据安全
FireEye EDR Agent Vulnerability Let Attackers Inject Malicious Code
A significant vulnerability in the FireEye Endpoint Detection and Response (EDR) agent that could allow attackers to inject malicious code and render critical security protections ineffective. The vulnerability, tracked as CVE-2025-0618, was disclosed today and highlights the ongoing challenges in securing endpoint protection platforms against sophisticated threat actors. FireEye EDR Agent DoS Vulnerability The newly […]
The post FireEye EDR Agent Vulnerability Let Attackers Inject Malicious Code appeared first on Cyber Security News.