Aggregator
Threat Attack Weekly - February 23 to March 2nd
9 months 2 weeks ago
Threat Attack Weekly - February 23 to March 2nd
Dark Web Informer - Cyber Threat Intelligence
RAID数据恢复深度解析:如何通过$MFT与分区结构重建Windows磁盘阵列
9 months 2 weeks ago
RAID数据丢失怎么办?学会分析Windows磁盘分区与文件系统,让你的RAID恢复更高效!
【偷录手机通话能作呈堂证供吗?】
9 months 2 weeks ago
文章原载于北京日报
喜报 | ChaMd5团队成员xyzz荣获阿里云安全守护卫士
9 months 2 weeks ago
RAID数据恢复深度解析:如何通过$MFT与分区结构重建Windows磁盘阵列
9 months 2 weeks ago
RAID数据丢失怎么办?学会分析Windows磁盘分区与文件系统,让你的RAID恢复更高效!
【偷录手机通话能作呈堂证供吗?】
9 months 2 weeks ago
文章原载于北京日报
喜报 | ChaMd5团队成员xyzz荣获阿里云安全守护卫士
9 months 2 weeks ago
喜报 | ChaMd5团队成员xyzz荣获阿里云安全守护卫士
9 months 2 weeks ago
【偷录手机通话能作呈堂证供吗?】
9 months 2 weeks ago
文章原载于北京日报
RAID数据恢复深度解析:如何通过$MFT与分区结构重建Windows磁盘阵列
9 months 2 weeks ago
RAID数据丢失怎么办?学会分析Windows磁盘分区与文件系统,让你的RAID恢复更高效!
【偷录手机通话能作呈堂证供吗?】
9 months 2 weeks ago
文章原载于北京日报
喜报 | ChaMd5团队成员xyzz荣获阿里云安全守护卫士
9 months 2 weeks ago
喜报 | ChaMd5团队成员xyzz荣获阿里云安全守护卫士
9 months 2 weeks ago
RAID数据恢复深度解析:如何通过$MFT与分区结构重建Windows磁盘阵列
9 months 2 weeks ago
RAID数据丢失怎么办?学会分析Windows磁盘分区与文件系统,让你的RAID恢复更高效!
【偷录手机通话能作呈堂证供吗?】
9 months 2 weeks ago
文章原载于北京日报
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
9 months 2 weeks ago
In this blog entry, we discuss how the Black Basta and Cactus ransomware groups utilized the BackConnect malware to maintain persistent control and exfiltrate sensitive data from compromised machines.
Catherine Loveria
剖析Black Basta勒索软件入侵策略:泄露日志揭示的攻击手法
9 months 2 weeks ago
Black Basta通过暴露的RDP/VPN服务和未打补丁的系统漏洞入侵网络,依赖信息窃取软件获取凭证,迅速利用新漏洞,严重威胁企业安全。
六网合一、业务融合、云端统管——解密智慧楼宇网络建设
9 months 2 weeks ago
构建一体化、高效且稳健的融合通信网络体系。
CVE-2024-47883 | OpenRefine simile-butterfly up to 1.2.5 URL java.net.URL absolute path traversal (GHSA-3p8v-w8mr-m3x8)
9 months 2 weeks ago
A vulnerability, which was classified as problematic, has been found in OpenRefine simile-butterfly up to 1.2.5. Affected by this issue is the function java.net.URL of the component URL Handler. The manipulation leads to absolute path traversal.
This vulnerability is handled as CVE-2024-47883. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com