Aggregator
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
CVE-2025-23042 (CVSS 9.1): Gradio 修补了流行机器学习平台中的关键 ACL 旁路漏洞
16-31 October 2024 Cyber Attacks Timeline
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
超过 66 万台 Rsync 服务器受到代码执行攻击
网传支付宝出现P0级事故 任意类型付款甚至转账都自动叠加国补优惠20%
【漏洞通告】Rsync缓冲区溢出与信息泄露漏洞(CVE-2024-12084/CVE-2024-12085)通告
AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks
AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024 that leveraged a 0DAY vulnerability on cnPilot routers and used RC4 encryption for sample strings. After a brief pause in September, the botnet reappeared in October with the name kitty and was updated again in November as AIRASHI. The current […]
The post AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Отельный бизнес потерял контроль над данными 24 млн туристов
Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?
A threat actor has leaked configuration files (aka configs) for over 15,000 Fortinet Fortigate firewalls and associated admin and user credentials. The collection has been leaked on Monday and publicized on an underground forum by the threat actor that goes by “Belsen_Group”, supposedly as a free offering to solidify the name of the group in the forum users’ memory. The leaked 1.6 GB archive contains folders ordered by country, and inside each are folders named … More →
The post Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them? appeared first on Help Net Security.
Malware Trends Overview Report: 2024
The Truth of the Matter: Scammers Targeting Truth Social Users
【安全圈】Fortinet 又被确认存在新的零日漏洞
【安全圈】超过 660,000 个 Rsync 服务器遭受代码执行攻击
【安全圈】TikTok计划本周日关停美国业务
【安全圈】2024年12月涉国内数据泄露事件汇总
Trusted Apps Sneak a Bug Into the UEFI Boot Process
New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware
Botnets are the networks of compromised devices that have evolved significantly since the internet’s inception. Threat actors exploit vulnerabilities to control these devices remotely by leveraging them for malicious activities. These activities range from spamming to launching devastating distributed denial-of-service (DDoS) attacks, as the decentralized nature of botnets presents significant challenges to defenders. By orchestrating […]
The post New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.