Aggregator
CVE-2018-17443 | D-Link Central WiFi Manager prior 1.03r0100-Beta1 sitename Stored cross site scripting (EDB-45533)
8 months 2 weeks ago
A vulnerability, which was classified as problematic, was found in D-Link Central WiFi Manager. Affected is an unknown function. The manipulation of the argument sitename as part of Parameter leads to cross site scripting (Stored).
This vulnerability is traded as CVE-2018-17443. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
TP-Link Tapo H200 V1 Smart Hub 漏洞:Wi-Fi 凭据面临泄露风险
8 months 2 weeks ago
安全客
日产聆风存在多个漏洞,可用于远程监控和物理接管
8 months 2 weeks ago
利用汽车中的漏洞可造成重大经济损失。
2025年最易受攻击的20种联网设备
8 months 2 weeks ago
在受严重漏洞影响最大的设备中,路由器占比超过一半。
CVE-2008-2219 | C-News 1.0.1 install.php etape cross site scripting (EDB-31714 / XFDB-42509)
8 months 2 weeks ago
A vulnerability, which was classified as problematic, has been found in C-News 1.0.1. This issue affects some unknown processing of the file install.php. The manipulation of the argument etape leads to cross site scripting.
The identification of this vulnerability is CVE-2008-2219. The attack may be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
Initial Access Brokers Shift Tactics, Selling More for Less
8 months 2 weeks ago
What are IABs?
Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks.
By selling access, they significantly mitigate the
The Hacker News
N-able 推出 UEM 产品漏洞管理新功能,提升企业数字安全防护能力
8 months 2 weeks ago
安全客
CVE-2024-30330 | Foxit PDF Reader AcroForm use after free
8 months 2 weeks ago
A vulnerability was found in Foxit PDF Reader. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component AcroForm Handler. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-30330. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
国际 | 马来西亚组建网络战部队
8 months 2 weeks ago
据报道,马来西亚国防部近期宣布,将组建一支专业化网络战部队。该部队主要负责网络威胁情报分析、网络恐怖袭击应急响应、网络攻击取证溯源,以及保障国防和关键军民设施的网络安全。
通知 | 浙江省网信办等两部门印发自由贸易试验区数据出境负面清单管理办法、负面清单(2024版)
8 months 2 weeks ago
近日,浙江省互联网信息办公室等两部门发布了《中国(浙江)自由贸易试验区数据出境负面清单管理办法(试行)》《中国(浙江)自由贸易试验区数据出境管理清单(负面清单)(2024版)》。
观点 | 依法整治AI技术滥用 促进AI应用规范向善
8 months 2 weeks ago
AI技术作为新一轮科技革命和产业变革的重要驱动力量,正以前所未有的速度向经济社会各领域加速渗透,赋能新质生产力发展,然而,AI技术在快速发展的同时,技术滥用乱象开始凸显,用户和网民的合法权益受到侵害,正常的信息传播秩序和市场秩序受到挑战。
外交部:反对美国利用网络问题干涉中国内政
8 months 2 weeks ago
有记者提问:据美国媒体报道,中国官员在去年12月的中美网络安全对话中向美方官员暗示,中方对美国关键基础设施发动了网络攻击,并将其归咎于美对台湾的支持。特朗普政府高官表示,美方将对中方采取更多的进攻性网络活动。中方对此有何评论?
专家解读 | 蔡立志:推进数据流通利用标准化建设,激活数字经济新动能
8 months 2 weeks ago
随着《国家数据标准体系建设指南》的发布与全国数据标准化技术委员会(SAC/TC609)工作的全面启动,我国数字经济迈入以标准化引领高质量发展的新阶段。
专家解读 | 刘博:完善法律责任制度 筑牢网络安全屏障
8 months 2 weeks ago
近日,国家网信办会同相关部门起草了《网络安全法(修正草案再次征求意见稿)》,从征求意见稿来看,主要是做好与《数据安全法》《个人信息保护法》等相关法律法规的衔接协调,完善法律责任制度,将进一步保障网络安全。
【智库报告】应对老龄化社会:从日本学习正确的经验教训
8 months 2 weeks ago
尽管日本经历了经济停滞和通缩压力,但通过提高劳动利用率、增加移民、实施财政扩张政策等措施,日本成功缓解了一些最严重的经济影响。随着更多国家进入快速老龄化阶段,全球经济增长放缓和地缘政治竞争加剧,其他国家可能面临比日本更严峻的挑战。
【智库报告】美国主导的贸易战很容易失败
8 months 2 weeks ago
今天给大家推送彼得森国际经济研究所所长亚当·S·波森(ADAM S. POSEN)的文章《贸易战很容易失败:北京在中美关税战中占据升级主导地位》
中科固源技术解析:Go-Fuzz实战指南,模糊测试工具高效应用技巧
8 months 2 weeks ago
中科固源
Windows NetExtender VPN 客户端现多个漏洞,SonicWall 紧急发布修复补丁
8 months 2 weeks ago
安全客
Seeing the Big Picture in Phishing Defense: IRONSCALES & CrowdStrike
8 months 2 weeks ago
At the start of this year, IRONSCALES launched an integration with CrowdStrike Falcon® Next-Gen SIEM, delivering enhanced threat visibility, detection, and correlation to help organizations combat phishing and account takeover (ATO) threats. This integration reflects our shared commitment to simplifying and strengthening cross-domain security—including email security—as a critical part of modern cyber defense.
The post Seeing the Big Picture in Phishing Defense: IRONSCALES & CrowdStrike appeared first on Security Boulevard.
James Savard