Aggregator
CVE-2023-45588 | Fortinet FortiClientMac up to 7.0.10/7.2.3 Configuration File /tmp file inclusion (FG-IR-23-345)
CVE-2022-29059 | Fortinet FortiWeb up to 6.2.8/6.3.23/6.4.3/7.0.1 Strings sql injection (FG-IR-22-140)
CVE-2024-47573 | Fortinet FortiNDR up to 7.0.6/7.1.1/7.2.1/7.4.2 Firmware Image integrity check (FG-IR-23-461)
CVE-2023-48785 | Fortinet FortiNAC-F up to 7.2.4 certificate validation (FG-IR-23-288)
CVE-2024-40590 | Fortinet FortiPortal up to 6.0.15/7.0.8/7.2.4/7.4.0 certificate validation (FG-IR-22-155)
CVE-2025-1888 | Leica BioSystems Aperio Eslide Manager 12.3.2.5030 memo cross site scripting
Минпромторг оценит российский кремний по новой системе
Ransomware gang creates tool to automate VPN brute-force attacks
Weekly Threat Landscape Digest – Week 11
This week’s cybersecurity landscape highlights the increasing complexity of cyber threats and the critical need for a proactive defense strategy. […]
The post Weekly Threat Landscape Digest – Week 11 appeared first on HawkEye.
Cisco IOS XR vulnerability lets attackers crash BGP on routers
Полупроводники теперь различают «лево» и «право»: что это значит для наших смартфонов
Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers
Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The attack utilizes multiple stages of obfuscation, including encrypted payloads and COM object manipulation, to ultimately deploy miners for various cryptocurrencies including Monero, Ravencoin, and several others. This previously unreported exploitation method demonstrates how threat actors […]
The post Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.