Aggregator
CVE-2024-37607 | D-Link DAP-2555 1.20 HTTP Request buffer overflow
CVE-2024-52875 | GFI Kerio Control up to 9.2.5 GET Parameter response splitting (KIS-2024-07)
Might need a mass password reset one day? Read this first.
To Defeat Cybercriminals, Understand How They Think
Attackers Can Find New APIs in 29 Seconds: Wallarm
Cybersecurity vendor Wallarm, using a honeypot, found that hackers can discover new APIs in 29 seconds and that APIs are now more targeted than web applications, highlighting the need to put a security focus on the increasingly popular business tools.
The post Attackers Can Find New APIs in 29 Seconds: Wallarm appeared first on Security Boulevard.
Foxit security advisory (AV24-720)
CVE-2024-53241 | Xen Hypercall Page information disclosure
Bits & Bytes: A Recap of AISS 2024
As a passionate cybersecurity enthusiast & a professional with ColorTokens, participating in the recently concluded 19th Annual Information Security Summit (AISS) 2024, organized by NASSCOM-DSCI, was an invaluable opportunity to immerse myself in the latest trends, innovations, and discussions shaping our industry. AISS 2024 lived up to its reputation as India’s premier platform for cybersecurity […]
The post Bits & Bytes: A Recap of AISS 2024 appeared first on ColorTokens.
The post Bits & Bytes: A Recap of AISS 2024 appeared first on Security Boulevard.
CVE-2024-53240 | Xen Linux Netfront null pointer dereference
CVE-2024-8972 | Mobil365 Informatics Saha365 App prior 30.09.2024 sql injection
绕过双因素认证至账户接管
Researchers reveal OT-specific malware in use and in development
Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient threats based on samples uploaded to VirusTotal: Claroty’s Team82 researchers have unearthed IOCONTROL, a piece of malware that appears to be generic enough to run on a variety of platforms and devices from different vendors. Forescout’s Vedere Labs researchers have … More →
The post Researchers reveal OT-specific malware in use and in development appeared first on Help Net Security.