Aggregator
报告发布 | BLACKBASTA勒索组织内部泄密事件分析报告
New Vulnerability in Substack let Attackers Take Over Subdomains
A newly disclosed edge case in Substack’s custom domain implementation allows threat actors to hijack inactive subdomains, potentially enabling content spoofing, phishing campaigns, and brand impersonation. The researcher identified 1,426 vulnerable domains – representing 8% of all Substack-associated custom domains – that remain exposed due to misconfigured DNS records, including 11 wildcard domains that exponentially […]
The post New Vulnerability in Substack let Attackers Take Over Subdomains appeared first on Cyber Security News.
DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation
If a company has effective insurance, prevention becomes even less cost-effective. By failing to “value” privacy alone, the system skews in favor of not protecting privacy.
The post DOGE Access to Personal Information and The Difficulty of Showing Harm in Privacy Litigation appeared first on Security Boulevard.
您有一份两会重保方案,请查收!
Ensuring Continuity in Industrial Operations: A Guide to OT Backup Strategies
Tailoring backup strategies to ensure operational resilience, safeguard critical configurations, and mitigate risks in Operational Technology environments.
The post Ensuring Continuity in Industrial Operations: A Guide to OT Backup Strategies appeared first on Sygnia.
New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
A new variant of malware, dubbed “Poco RAT,” has emerged as a potent espionage tool in a campaign targeting Spanish-speaking users in Latin America. Security researchers at Positive Technologies Expert Security Center (PT ESC) have linked this malware to the notorious Dark Caracal group, known for its cyber-mercenary operations. The campaign employs weaponized PDF files […]
The post New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2005-3855 | Easybe 1-2-3 music store 1.0 process.php AlbumID sql injection (EDB-26561 / BID-15544)
CVE-2024-49335 | Edush Maxim GoogleDrive folder list Plugin up to 2.2.2 on WordPress cross-site request forgery
CVE-2024-49629 | Fahad Mahmood Endless Posts Navigation Plugin up to 2.2.7 on WordPress cross-site request forgery
CVE-2024-49605 | Avchat.net AVChat Video Chat Plugin up to 2.2 on WordPress cross-site request forgery
CVE-2024-10198 | code-projects Pharmacy Management System 1.0 Manage Customer Page /manage_customer.php suppliers_name/address cross site scripting
CVE-2024-10197 | code-projects Pharmacy Management System 1.0 Manage Supplier Page /manage_supplier.php address cross site scripting
CVE-2024-43945 | LatePoint Plugin up to 4.9.91 on WordPress cross-site request forgery
CVE-2024-10199 | code-projects Pharmacy Management System 1.0 Manage Medicines Page /manage_medicine.php name/address/doctor_address/suppliers_name cross site scripting
U.S. Suspends Cyberattacks Against Russia
The United States has suspended offensive cyber operations against Russia under an order issued by Defense Secretary Pete Hegseth, according to multiple confirmed reports. The directive, first revealed by The Record and corroborated by The New York Times and The Washington Post, marks a notable shift in the Pentagon’s cyber strategy amid escalating global tensions. While U.S. Cyber Command—tasked with […]
The post U.S. Suspends Cyberattacks Against Russia appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ICO Launches TikTok Investigation Over Use of Children’s Data
Смена приоритетов: США выводят Россию из фокуса разведки
Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to deceive users and steal sensitive personal data. The attackers exploited vulnerabilities in Google’s ad policies and PayPal’s “no-code checkout” feature to create fraudulent payment links that appeared legitimate, tricking victims into engaging with fake customer support agents. Exploitation of Google […]
The post Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.