Aggregator
Meow
Interlock Ransomware Targets US Healthcare, IT and Government Sectors
Canada orders TikTok to shut down over national risk concerns
DPRK-linked BlueNoroff used macOS malware with novel persistence
5 new insights from Red Canary Intelligence
Z-BL4CX-H4T Defaced the Website of JOSSLUX
DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates
Authors/Presenters: Alon Leviev
Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Windows Downdate: Downgrade Attacks Using Windows Updates appeared first on Security Boulevard.
文末有礼 丨 跨版本更新!火绒安全5.0正式支持升级6.0版本
SecWiki News 2024-11-07 Review
用Joern进行PHP漏洞复现与挖掘 by ourren
TIMiner:从社交数据中自动提取和分析分类的网络威胁情报 by ourren
更多最新文章,请访问SecWiki
如何使用Slhasher批量执行VirusTotal哈希数据检索
黑客攻击利用Microsoft服务逃避检测并分发恶意软件
HPE warns of critical RCE flaws in Aruba Networking access points
第107篇:国*攻防比赛中一个多层嵌套的java内存马的反混淆解密分析过程
第107篇:国*攻防比赛中一个多层嵌套的java内存马的反混淆解密分析过程
CVE-2024-10668 | Google Nearby Quickshare unrestricted upload
CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack
Threat actors are becoming increasingly creative, using vulnerabilities to infiltrate organizations in ways that might not immediately raise alarms. Veriti’s research team recently discovered a targeted email campaign utilizing CVE-2024-38213, cleverly disguised to appear associated with the Gas Infrastructure Europe (GIE) Annual Conference in Munich. By taking advantage of this vulnerability, attackers managed to bypass […]
The post CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack appeared first on VERITI.
The post CVE-2024-38213: From Crumbs to Full Compromise in a Stealthy Cyber Attack appeared first on Security Boulevard.
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs
CVE-2024-9926 | Jetpack Plugin up to 13.9.0 on WordPress REST Endpoint authorization
AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application
AppOmni announced a partnership that combines the company’s Zero Trust Posture Management (ZTPM) solution with Cisco’s Security Service Edge (SSE) technology suite.
The post AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application appeared first on AppOmni.
The post AppOmni and Cisco Partner to Extend SaaS Security with End-to-End Zero Trust From Endpoint to the Application appeared first on Security Boulevard.