Aggregator
【安全圈】上海警方破获百万级拍卖外挂大案!技术宅"黑吃黑"终落网
9 months 1 week ago
关键词外挂🚨案件核心:上海市杨浦警方近日捣毁一条拍卖平台外挂黑产链,涉案金额超100万元!
【安全圈】巴对印发起网络攻击,致70%印度电网瘫痪
9 months 1 week ago
香港大学 | 刘诗楠课题组招生
9 months 1 week ago
招聘25 Fall/26 Spring/26 Fall博士
香港大学 | 刘诗楠课题组招生
9 months 1 week ago
招聘25 Fall/26 Spring/26 Fall博士
Mature But Vulnerable: Pharmaceutical Sector's Cyber Reality
9 months 1 week ago
Pharmaceutical companies typically have more mature cyber programs than other healthcare factions, but these firms also face unique risks involving their large attack surfaces, complex manufacturing, supply chains and sensitive intellectual property, said Joshua Mullen of Booz Allen Hamilton.
New KnowBe4 CEO Bryan Palma Combats Human Risk Via AI Agents
9 months 1 week ago
Strategic Plan Includes Human Risk Management Platform Expansion, IPO Preparation
Bryan Palma outlines his vision to grow KnowBe4 beyond security awareness training by investing in agentic AI, expanding email and behavioral tools and positioning the company for IPO readiness. He highlights Vista Equity's support and platform depth as key assets.
Bryan Palma outlines his vision to grow KnowBe4 beyond security awareness training by investing in agentic AI, expanding email and behavioral tools and positioning the company for IPO readiness. He highlights Vista Equity's support and platform depth as key assets.
ISMG Editors: CISA Cuts and US Cyber Plan Raise Alarms
9 months 1 week ago
Also: Cyber IPOs and the Investment Climate, the Urgency of AI Explainability
In this week's update, ISMG editors unpacked Trump's teased "grand cyber plan" amid budget cuts to the Cybersecurity and Infrastructure Security Agency, key business takeaways from RSAC Conference 2025 and why explainability in artificial intelligence is becoming critical to trust and security.
In this week's update, ISMG editors unpacked Trump's teased "grand cyber plan" amid budget cuts to the Cybersecurity and Infrastructure Security Agency, key business takeaways from RSAC Conference 2025 and why explainability in artificial intelligence is becoming critical to trust and security.
CyberUK 2025: Resilience and APT Threats Loom Large
9 months 1 week ago
Government Officials Sound 'Wake Up' Alarms
A rash of cyber incidents felt by British businesses add up to a wake-up call that cybersecurity is an absolute priority, top government officials warned during an annual conference hosted by the National Cyber Security Centre. The NCSC unveiled cyber resilience measures timed for the conference.
A rash of cyber incidents felt by British businesses add up to a wake-up call that cybersecurity is an absolute priority, top government officials warned during an annual conference hosted by the National Cyber Security Centre. The NCSC unveiled cyber resilience measures timed for the conference.
AWS Pushes AI-Powered Threat Detection With Key Partners
9 months 1 week ago
Partners Use Bedrock, SageMaker for Threat Detection, Response, Vital to Innovation
AWS is enabling cybersecurity firms to enhance detection, triage and response capabilities by embedding generative AI into services like Bedrock and SageMaker, while reinforcing its position as a partner-centric cloud security leader, said Managing Director Rohan Karmarkar.
AWS is enabling cybersecurity firms to enhance detection, triage and response capabilities by embedding generative AI into services like Bedrock and SageMaker, while reinforcing its position as a partner-centric cloud security leader, said Managing Director Rohan Karmarkar.
CVE-2020-3746 | Adobe Acrobat Reader use after free (APSB20-05)
9 months 1 week ago
A vulnerability, which was classified as critical, was found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. Affected is an unknown function. The manipulation leads to use after free.
This vulnerability is traded as CVE-2020-3746. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3748 | Adobe Acrobat Reader use after free (APSB20-05)
9 months 1 week ago
A vulnerability has been found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to use after free.
This vulnerability is known as CVE-2020-3748. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3742 | Adobe Acrobat Reader out-of-bounds write (APSB20-05)
9 months 1 week ago
A vulnerability was found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2020-3742. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3752 | Adobe Acrobat Reader memory corruption (APSB20-05)
9 months 1 week ago
A vulnerability was found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2020-3752. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3754 | Adobe Acrobat Reader memory corruption (APSB20-05)
9 months 1 week ago
A vulnerability classified as critical has been found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2020-3754. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3743 | Adobe Acrobat Reader use after free (APSB20-05)
9 months 1 week ago
A vulnerability classified as critical was found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. This vulnerability affects unknown code. The manipulation leads to use after free.
This vulnerability was named CVE-2020-3743. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3745 | Adobe Acrobat Reader use after free (APSB20-05)
9 months 1 week ago
A vulnerability, which was classified as critical, has been found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. This issue affects some unknown processing. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2020-3745. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2020-3755 | Adobe Acrobat Reader out-of-bounds (APSB20-05)
9 months 1 week ago
A vulnerability was found in Adobe Acrobat Reader up to 2015.006.30508/2017.011.30156/2019.021.20061. It has been classified as problematic. Affected is an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2020-3755. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2000-0429 | Mcmurtrey Whitaker And Associates Cart32 2.6/3.0 backdoor (EDB-19881 / Nessus ID 10389)
9 months 1 week ago
A vulnerability was found in Mcmurtrey Whitaker And Associates Cart32 2.6/3.0. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to backdoor.
The identification of this vulnerability is CVE-2000-0429. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Threat Actors Attacking Job Seekers With Three New Unique Adversaries
9 months 1 week ago
A significant surge in sophisticated recruitment scams has emerged, with cybercriminals exploiting economic vulnerabilities and the competitive job market to target desperate job seekers. These scams employ increasingly refined social engineering tactics that blend legitimate recruitment practices with fraudulent schemes, making them particularly effective at evading detection while extracting money and personal information from victims. […]
The post Threat Actors Attacking Job Seekers With Three New Unique Adversaries appeared first on Cyber Security News.
Tushar Subhra Dutta