Aggregator
Эмодзи-код: снежинки и сердечки стали языком преступников
8 months 3 weeks ago
Соцсети на виду у всех заменили темные переулки.
Nigeria Cracks Down on Cryptocurrency Investment Fraud and Romance Scams
8 months 3 weeks ago
The suspects were apprehended in a surprise operation at their hideout in Lagos following intelligence received by Nigeria's Economic and Financial Crimes Commission
APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP
8 months 3 weeks ago
The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files.
The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a "rogue RDP" technique that was previously
The Hacker News
APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP
8 months 3 weeks ago
Cyber Espionage / MalwareThe Russia-linked APT29 threat actor has been observed repurposing a legi
解决 Apache Tomcat 中的 RCE 和 DoS 漏洞: CVE-2024-50379 和 CVE-2024-54677
8 months 3 weeks ago
安全客
俄罗斯、伊朗和以色列通过 SS7 监视美国居民
8 months 3 weeks ago
美国国土安全部 (DHS) 相信俄罗斯、伊朗和以色列是利用电信网络安全漏洞监视美国境内居民的主要国家,它们的行为包括跟踪居民的物理位置、拦截电话和短信。跟踪物理位置利用的是 SS7 协议。七号信令系统(SS7,Signaling System Number 7)是路由协议,允许手机用户在外国旅行时从一个运营商无缝连接到另一个运营商。它缺乏安全验证,容易被利用去实时定位用户。安全研究人员很早就报告了 SS7 的漏洞。
俄罗斯、伊朗和以色列通过 SS7 监视美国居民
8 months 3 weeks ago
美国国土安全部 (DHS) 相信俄罗斯、伊朗和以色列是利用电信网络安全漏洞监视美国境内居民的主要国家,它们的行为包括跟踪居民的物理位置、拦截电话和短信。跟踪物理位置利用的是 SS7 协议。
APT73
8 months 3 weeks ago
cohenido
Statiegeld levert €44.200 voor Hulphond Nederland op
8 months 3 weeks ago
Hulphond Nederland heeft gisteren een donatie van €44.200,- gekregen. Een bijdrage die bijeen werd gespaard door alle medewerkers van Defensie. Dat gebeurde door het inleveren van plastic drinkflesjes en blikjes.
零点击 HomeKit 漏洞被用来监视塞尔维亚记者
8 months 3 weeks ago
安全客
How DFIR Analysts Use ANY.RUN Sandbox
8 months 3 weeks ago
Recently, DFIR consultant & content creator/educator Steven from the YouTube channel MyDFIR released a new video showing how DFIR professionals can leverage the ANY.RUN Sandbox to efficiently analyze malware and extract actionable intelligence. The video provides a step-by-step guide on investigating real-world threats, including how to quickly identify and analyze Indicators of Compromise (IOCs) and […]
The post How DFIR Analysts Use ANY.RUN Sandbox appeared first on ANY.RUN's Cybersecurity Blog.
ANY.RUN
gta 5 ultra compressed only (7 gb)
8 months 3 weeks ago
CVE-2024-47104 | IBM i 7.4/7.5 Physical File Security Attributes permission assignment
8 months 3 weeks ago
A vulnerability, which was classified as problematic, has been found in IBM i 7.4/7.5. This issue affects some unknown processing of the component Physical File Security Attributes Handler. The manipulation leads to incorrect permission assignment.
The identification of this vulnerability is CVE-2024-47104. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
消费降级、全球化终结:投资不再靠过去的经验,普通人如何调整方向
8 months 3 weeks ago
全球经济正经历深刻变革,从意识形态的周期性转变到消费降级和全球化的终结,投资者应如何调整策略以应对不确定性?本文分析了当前经济趋势、消费变化、全球政治局势及其对投资的影响,提出了切实可行的投资建议,帮
罗德岛医疗系统数据泄露,黑客索要赎金
8 months 3 weeks ago
安全客
Cactus
8 months 3 weeks ago
cohenido
CVE-2024-11483 | Red Hat Ansible Automation Platform 2.5 OAuth2 Token access control (Nessus ID 213128)
8 months 3 weeks ago
A vulnerability was found in Red Hat Ansible Automation Platform 2.5. It has been classified as critical. This affects an unknown part of the component OAuth2 Token Handler. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-11483. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2013-2115 | Apache Struts up to 2.2.3.0 code injection (EDB-25980 / Nessus ID 66935)
8 months 3 weeks ago
A vulnerability was found in Apache Struts up to 2.2.3.0. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to code injection.
The identification of this vulnerability is CVE-2013-2115. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-53114 | Linux Kernel up to 6.11.9 denial of service (00c713f84f47/a5ca1dc46a6b / Nessus ID 213130)
8 months 3 weeks ago
A vulnerability was found in Linux Kernel up to 6.11.9. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2024-53114. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com