Aggregator
2025XYCTF writeup by Mini-Venom
8 months 3 weeks ago
2025XYCTF writeup by Mini-Venom
8 months 3 weeks ago
CVE-2022-4465 | WP Video Lightbox Plugin up to 1.9.6 on WordPress Shortcode Attribute cross site scripting
8 months 3 weeks ago
A vulnerability, which was classified as problematic, was found in WP Video Lightbox Plugin up to 1.9.6 on WordPress. Affected is an unknown function of the component Shortcode Attribute Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2022-4465. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2022-41859 | FreeRADIUS EAP-PWD compute_password_element information disclosure
8 months 3 weeks ago
A vulnerability was found in FreeRADIUS and classified as problematic. Affected by this issue is the function compute_password_element of the component EAP-PWD Handler. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2022-41859. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2022-43976 | GE Grid Solutions MS3000 FC46-WebBridge improper authentication (bsi-2022-0005)
8 months 3 weeks ago
A vulnerability was found in GE Grid Solutions MS3000. It has been classified as critical. Affected is an unknown function of the component FC46-WebBridge. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2022-43976. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2022-43975 | GE Grid Solutions MS3000 FC46-WebBridge path traversal (bsi-2022-0005)
8 months 3 weeks ago
A vulnerability was found in GE Grid Solutions MS3000. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component FC46-WebBridge. The manipulation leads to path traversal.
This vulnerability is known as CVE-2022-43975. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-30979 | Cyber Cafe Management System 1.0 edit-computer-details.php compname cross site scripting
8 months 3 weeks ago
A vulnerability classified as problematic was found in Cyber Cafe Management System 1.0. Affected by this vulnerability is an unknown functionality of the file edit-computer-details.php. The manipulation of the argument compname leads to cross site scripting.
This vulnerability is known as CVE-2024-30979. The attack can be launched remotely. There is no exploit available.
vuldb.com
Daily Dose of Dark Web Informer - 7th of April 2025
8 months 3 weeks ago
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
Dark Web Informer - Cyber Threat Intelligence
Experts Optimistic About Secure by Design Progress
8 months 3 weeks ago
Secure by Design is an important step to reduce the number of vulnerabilities present originally, but is it progressing fast enough? According to security experts Chris Wysopal and Jason Healey, the landscape is improving.
Arielle Waldman
Threat Attack Daily - 7th of April 2025
8 months 3 weeks ago
Threat Attack Daily - 7th of April 2025
Dark Web Informer - Cyber Threat Intelligence
Palo Alto Networks Begins Unified Security Rollout
8 months 3 weeks ago
Cortex Cloud integrates Prisma Cloud with CDR to provide a consolidated security posture management and real-time threat detection and remediation platform.
Jeffrey Schwartz
Ransomware Attack Update for the 7th of April 2025
8 months 3 weeks ago
Ransomware Attack Update for the 7th of April 2025
Dark Web Informer - Cyber Threat Intelligence
在李克农身边的日子
8 months 3 weeks ago
书中内容完美贴合四个字,誓言无声。
在李克农身边的日子
8 months 3 weeks ago
书中内容完美贴合四个字,誓言无声。
Tariff Wars: The Technology Impact
8 months 3 weeks ago
How CIOs and CISOs Can Navigate With Balance
Tariff wars may hit technology leaders hard in 2025 as the Trump administration's 10% import tax, plus reciprocal tariffs, spikes costs. CIOs and CISOs face supply chain disruption and heightened cyber risks. But they can adapt with cloud shifts, smart deals and better advocacy.
Tariff wars may hit technology leaders hard in 2025 as the Trump administration's 10% import tax, plus reciprocal tariffs, spikes costs. CIOs and CISOs face supply chain disruption and heightened cyber risks. But they can adapt with cloud shifts, smart deals and better advocacy.
Ransomware Underground Faces Declining Relevance
8 months 3 weeks ago
Rising Attacks Mask Lowering Profits, Attention Economy Competition
Ransomware groups' collective power to command victims' attention and compel extortion is waning, notwithstanding the disruption and chaos that continues to be their hallmark. The criminal underground powering ransomware is a world in flux where old, established groups are giving way to new brands.
Ransomware groups' collective power to command victims' attention and compel extortion is waning, notwithstanding the disruption and chaos that continues to be their hallmark. The criminal underground powering ransomware is a world in flux where old, established groups are giving way to new brands.
Dental Practice Support Firm Notifying 173,400 of Email Hack
8 months 3 weeks ago
Breach Affects Pediatric, Orthodontic and Dental Surgery Practices in 6 States
A Nashville, Tennessee firm that provides HR and finance services to dozens of specialty dental practices across six states is notifying more than 173,400 people of a 2024 email hacking incident affecting children and other patients. The company already faces several lawsuits related to the breach.
A Nashville, Tennessee firm that provides HR and finance services to dozens of specialty dental practices across six states is notifying more than 173,400 people of a 2024 email hacking incident affecting children and other patients. The company already faces several lawsuits related to the breach.
Lazarus Expands NPM Campaign With Trojan Loaders
8 months 3 weeks ago
North Korea's Lazarus Deploys Malicious NPM Packages to Steal Data
North Korea's Lazarus Group expanded a malicious campaign of uploading malicious code to the JavaScript runtime environment npm repository, publishing 11 packages embedded with Trojan loaders. Researchers identified 11 malicious packages in the repository, a hotspot for supply chain attacks.
North Korea's Lazarus Group expanded a malicious campaign of uploading malicious code to the JavaScript runtime environment npm repository, publishing 11 packages embedded with Trojan loaders. Researchers identified 11 malicious packages in the repository, a hotspot for supply chain attacks.
The Convergence of IAM, Cybersecurity, Fraud and Compliance
8 months 3 weeks ago
Gartner's Pete Redshaw on Why the CISO or CRO Should Take the Lead
Cybersecurity, IAM, fraud and compliance will converge across financial institutions in the next five to six years. This transformation will follow a phased path, beginning with data integration, followed by tool alignment and eventually team restructuring.
Cybersecurity, IAM, fraud and compliance will converge across financial institutions in the next five to six years. This transformation will follow a phased path, beginning with data integration, followed by tool alignment and eventually team restructuring.