Aggregator
CVE-2024-29156 | OpenStack Murano up to 16.0.0 YAQL information disclosure
CVE-2023-6821 | BestWebSoft Error Log Viewer Plugin up to 1.1.2 on WordPress PHP Log information disclosure
Yodobashi Camera Users Under Attack from a New Wave of Phishing Attack
A new wave of phishing attacks impersonating Japanese electronics retail giant Yodobashi Camera has emerged, leveraging urgency and brand trust to steal customer credentials. Cybersecurity firm Symantec reported the campaign, which uses emails titled “Yodobashi.com: ‘Customer Information’ Change Request Notification” to trick recipients into visiting fake login pages. The attacks highlight evolving tactics in social […]
The post Yodobashi Camera Users Under Attack from a New Wave of Phishing Attack appeared first on Cyber Security News.
CVE-2024-25903 | Frontend File Manager Plugin up to 22.7 on WordPress User Upload information disclosure
CVE-2024-25933 | Pepro Dev Group PeproDev Ultimate Invoice Plugin up to 1.9.7 on WordPress information disclosure
CVE-2024-27959 | Wpexpertsio WC Shop Sync Plugin up to 4.2.9 on WordPress cross site scripting
CVE-2024-27957 | Pie Register Plugin up to 3.8.3.1 on WordPress unrestricted upload
CVE-2024-27958 | Themeisle Visualizer Plugin up to 3.10.5 on WordPress cross site scripting
CVE-2024-25591 | Benjamin Rojas WP Editor Plugin up to 1.2.7 on WordPress information disclosure
Akira
Lockbit
RansomHub
CVE-1999-0347 | Micosoft Internet Explorer 4.01 javascript URL authentication spoofing (EDB-19156 / XFDB-2069)
Generative AI Shows Promise for Faster Triage of Vulnerabilities
Modern Approach to Attributing Hacktivist Groups
Research by: Itay Cohen (@megabeets_) Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor website defacements and distributed denial-of-service (DDoS) attacks, which, while making headlines, had minimal lasting impact. However, in recent years, we have observed a significant shift in the nature of these activities. Groups that appear to […]
The post Modern Approach to Attributing Hacktivist Groups appeared first on Check Point Research.
Some TXT about, and A PTR to, new DNS insights on Cloudflare Radar
Hackers Can Crack Into Car Cameras in Minutes Flat
Ocean Infinity 重新开始搜寻 MH370
Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works
Threat Intelligence Feeds from ANY.RUN provide a continuously-updated stream of the latest indicators of compromise. They enable SOC teams to quickly detect and mitigate attacks, including emerging malware and persistent threats. But how do ANY.RUN’s feeds get enriched with fresh and, most importantly, unique indicators? Let’s find out. About ANY.RUN’s Threat Intelligence Feeds ANY.RUN’s Threat […]
The post Enriching ANY.RUN’s TI Feeds with Unique IOCs: How It Works appeared first on ANY.RUN's Cybersecurity Blog.