Aggregator
CVE-2022-25339 | ownCloud 2.20 on Android access control
CVE-2023-25015 | Clockwork Web up to 0.1.1 cross-site request forgery
CVE-2021-36431 | jocms 0.8 mask.php jo_json_check sql injection
CVE-2021-37234 | Modern Honey Network 0abf0db9cd893c6d5c727d036e1f817c02de4c7b Web API access control (Issue 809)
CVE-2021-36538 | Gurock TestRail up to 7.1.1 reference/description cross site scripting
CVE-2022-34138 | Biltema IP and Baby Camera Software 124 resource injection
CVE-2023-20604 | MediaTek MT6735 ged out-of-bounds write (ALPS07494067)
Snow White — Beware the Bad Apple in the Torrent
As the new Snow White movie arrives in theaters with lackluster audience attendance (source), the absence of streaming options on platforms like Disney+ has nudged many users to seek pirated versions online. From our perspective, this kind of consumer behavior isn’t new, every high-profile movie release without a digital option becomes an opportunity for attackers […]
The post Snow White — Beware the Bad Apple in the Torrent appeared first on VERITI.
The post Snow White — Beware the Bad Apple in the Torrent appeared first on Security Boulevard.
StreamElements discloses third-party data breach after hacker leaks data
Сократ против ChatGPT: ИИ стирает границы человеческого мышления
CVE-2025-2825: Unauthenticated HTTP(S) port access on CrushFTPv10/v11
Anonymous Italia Defaced the Website of Zoo Salon FOX
Прощание с суперсимметрией: любимая теория физиков оказалась миражом
Z-PENTEST ALLIANCE Targeted the Website of ALYN Hospital
New Atlantis AIO platform automates credential stuffing on 140 services
bincrypter: A Linux Binary Runtime Crypter
bincrypter – Pack/Encrypt/Obfuscate ELF + SHELL scripts A Linux Binary Runtime Crypter – in BASH! Features Obfuscates & encrypts any ELF binary or #!-script AV/EDR death: Morphing + different signature every time 100% in-memory. No temporary...
The post bincrypter: A Linux Binary Runtime Crypter appeared first on Penetration Testing Tools.
GitLab security advisory (AV25-166)
Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks
In a concerning development for cybersecurity professionals, threat actors are increasingly utilizing a powerful tool called Atlantis AIO to automate and scale credential stuffing attacks across more than 140 platforms. This multi-checker tool, designed to exploit stolen user credentials, has emerged as a formidable weapon in the cybercriminal arsenal, enabling attackers to test millions of […]
The post Threat Actors Use “Atlantis AIO” Tool to Automate Credential Stuffing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit COM Objects for Fileless Malware and Lateral Movement
Security researchers Dylan Tran and Jimmy Bayne have unveiled a new fileless lateral movement technique that exploits trapped Component Object Model (COM) objects in Windows systems. This method, based on research by James Forshaw of Google Project Zero, allows attackers to execute .NET managed code in the context of a server-side Distributed COM (DCOM) process. […]
The post Hackers Exploit COM Objects for Fileless Malware and Lateral Movement appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.