Aggregator
Двойное лезвие ИИ: нейросети поссорили ИБ-директоров и больших боссов
Attackers allegedly stole $69 million from cryptocurrency platform Phemex
Attackers allegedly stole $69 million from cryptocurrency platform Phemex
春节放假通知
35 млрд штраф: IT-гиганты игнорируют требования Роскомнадзора
Critical Fleet Server Vulnerability Exposes Sensitive Information
A critical vulnerability (CVE-2024-52975) has been identified in Elastic’s Fleet Server, posing a severe risk of sensitive information exposure. The flaw, affecting Fleet Server versions 8.13.0 through 8.15.0, allows sensitive data to be logged at the INFO and ERROR log levels, potentially exposing confidential details depending on the integrations enabled. Details of the Vulnerability The […]
The post Critical Fleet Server Vulnerability Exposes Sensitive Information appeared first on Cyber Security News.
How to Run Incident Response Tabletop Exercises in 2025
Discover how to prepare your organization for cyber threats in 2025 with incident response tabletop exercises. Learn strategies to strengthen your response plans.
The post How to Run Incident Response Tabletop Exercises in 2025 appeared first on Sygnia.
Submit #485301: jq jq is a command-line JSON processor. 1.7.1 Buffer Overflow [Duplicate]
New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in the Linux kernel. Presented at the prestigious USENIX Security Symposium in August 2024, the framework aims to address long-standing gaps in understanding how memory corruption can be exploited to compromise system integrity. SCAVY’s developers have […]
The post New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New way to exploit BYOVD exploits with symbolic links.
CVE-2001-1021 | Ipswitch WS FTP Server 2.02 FTP Command memory corruption (EDB-1158 / Nessus ID 11094)
CVE-2024-43445 | OTRS/OTRS Community Edition up to 7.0.x/8.0.x/2023.x/2024.x/2025.1.x HTTP Response Header unrestricted upload
CVE-2024-43446 | OTRS/OTRS Community Edition up to 7.0.x/8.0.x/2023.x/2024.x/2025.1.x Generic Interface Module privileges management
CVE-2025-24389 | OTRS/OTRS Community Edition 7.0.x/8.0.x/2023.x/2024.x log file
CVE-2025-24390 | OTRS 7.0.x/8.0.x/2023.x/2024.x missing secure attribute
Windows最佳匹配字符转换漏洞:WorstFit攻击面
Windows Charset Conversion Feature Exploited to Execute Remote Code
Security researchers have uncovered a critical vulnerability in Windows stemming from its “Best-Fit” character conversion feature, which has been exploited to execute remote code. This newly identified attack surface, dubbed “WorstFit,” leverages certain features of Windows’ internal character encoding system to launch sophisticated attacks, including path traversal, argument injection, and remote code execution (RCE). The […]
The post Windows Charset Conversion Feature Exploited to Execute Remote Code appeared first on Cyber Security News.