Aggregator
CVE-2024-8633 | Form Maker Plugin up to 1.15.27 on WordPress cross site scripting
CVE-2024-9177 | Themedy Toolbox Plugin up to 1.0.15 on WordPress Shortcode cross site scripting
CVE-2024-8126 | Advanced File Manager Plugin up to 5.2.8 on WordPress unrestricted upload
CVE-2024-8725 | Advanced File Manager Plugin up to 5.2.8 on WordPress unrestricted upload
CVE-2024-47044 | Nippon Telegraph and Telephone East Hikari Denwa router RT-400MI Device Setting Page clickjacking
Google Warns Of North Korean IT Workers Have Infiltrated The U.S. Workforce
North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue for their regime, evading sanctions and funding WMD programs by exploiting privileged access to enable cyber intrusions. Facilitators, often non-North Koreans, assist these workers by laundering money, hosting company laptops, using stolen identities, and accessing international financial systems, which help the […]
The post Google Warns Of North Korean IT Workers Have Infiltrated The U.S. Workforce appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
迪士尼遭黑客入侵泄露1.1TB数据,被迫弃用Slack
向ChatGPT植入恶意“长期记忆”,持续窃取用户输入数据
New MIT protocol protects sensitive data during cloud-based computation
Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often require powerful cloud-based servers. This dependency on cloud computing raises notable security concerns, particularly in sensitive sectors like healthcare. Hospitals, for instance, may be reluctant to adopt AI tools for analyzing confidential patient data due to potential privacy risks. To tackle this pressing issue, MIT researchers have developed a security protocol that leverages the quantum … More →
The post New MIT protocol protects sensitive data during cloud-based computation appeared first on Help Net Security.
CVE-2024-47197 | Apache Maven Archetype Plugin 3.2.x archetype-settings.xml information disclosure
CVE-2024-47145 | Mattermost up to 9.5.8 Archived Channel access control
CVE-2024-47003 | Mattermost up to 9.5.8/9.11.0 Permalink Post resource consumption
CVE-2024-42406 | Mattermost up to 9.5.8/9.9.2/9.10.1/9.11.0 Archived Channel access control
TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data
The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data, exfiltrates sensitive information, and aims to inflict maximum damage on critical assets. The threat actor likely scans IP address ranges in Russia to identify VPN servers and applications accessible from the internet that could serve […]
The post TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.