Aggregator
CVE-2024-48706 | Collabtive 3.1 managemessage.php title cross site scripting
CVE-2024-48570 | Client Management System 1.0 bwdates-reports-ds.php Between Dates Reports sql injection
CVE-2024-48927 | Umbraco CMS up to 8.18.14/10.8.6/13.5.1 SVG File Preview injection (GHSA-5955-cwv4-h7qh)
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans
CVE-2024-9287 | Python CPython up to 3.13.0 venv /venv/bin/python unquoted search path
5000 тонн силы: Китай создал самый мощный в мире гидроцилиндр
Live Webinar | Agency Cyber Incident Response Team (CIRT) Playbook
Socket Accelerates Open-Source Security With $40M Series B
A $40 million Series B investment will support Socket in rapidly scaling its team and product development. Following a 400% revenue increase, the company plans to build on its success by expanding its application security offerings and enterprise support for more programming languages.
USENIX NSDI ’24 – THC: Accelerating Distributed Deep Learning Using Tensor Homomorphic Compression
Authors/Presenters:Minghao Li, Ran Ben Basat, Shay Vargaftik, ChonLam Lao, Kevin Xu, Michael Mitzenmacher, Minlan Yu
Our sincere thanks to USENIX, and the Presenters & Authors for publishing their superb 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI '24) content, placing the organizations enduring commitment to Open Access front and center. Originating from the conference’s events situated at the Hyatt Regency Santa Clara; and via the organizations YouTube channel.
The post USENIX NSDI ’24 – THC: Accelerating Distributed Deep Learning Using Tensor Homomorphic Compression appeared first on Security Boulevard.
Randall Munroe’s XKCD ‘Temperature Scales’
via the comic humor & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Temperature Scales’ appeared first on Security Boulevard.
5 new protections on Google Messages to help keep you safe
Swarms of Fake WordPress Plug-ins Infect Sites With Infostealers
Китайские хакеры атакуют не только сети, но и умы тайваньцев
智领未来,安全共生 | 360漏洞云亮相“S创上海2024”,共探AI安全发展
LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks
Tricky CAPTCHA Caught Dropping Lumma Stealer Malware
波音和英特尔的危机被认为危及美国国家安全
From Exploit to Extraction: Data Exfil in Blind RCE Attacks
Learn how to write exploits that take advantage of blind command injection vulnerabilities using a time-delayed boolean oracle attack.
The post From Exploit to Extraction: Data Exfil in Blind RCE Attacks appeared first on Dana Epp's Blog.