50套.NET系统漏洞威胁情报(12.13更新) 不安全 2 months ago 51某景ERP任意文件下载51.1 漏洞概述某景 GetFile 接口存在任意文件读取漏洞,未经身份验证攻击者可通过该漏洞读取系统重要文件(如数据库配置文件、系统配置文件)、数据库配置文件等等,导致网
5 Signs You’ve Built a Secretly Bad Architecture (And How to Fix It) 不安全 2 months ago In the hustle to deliver value, development teams can unknowingly create software architectures that
Remote buffer overflow vulnerability in SharkSSL TLS handshake processing 不安全 2 months ago A new remote buffer overflow vulnerability was discovered in the latest version of the SharkSSL
Triage: The not-so-secret hack to impactful bug bounty programs 不安全 2 months ago At the core of every thriving bug bounty platform lies its triage team. These teams evaluate vulnera
Is Your Hospital Sharing Patient Data with Facebook? A Guide for Security and Privacy Teams 不安全 2 months ago Recent lawsuits have revealed
助力新能源车企智能网联高速发展,构建一体化安全运营中心 不安全 2 months ago 前 言如若推举能源革命和IT技术革命的集大成者,在过去的几年间,汽车产业可以说是当仁不让,舍我其谁。一方面是电动化时代,新能源车的产销率屡创新高,大有取代传统燃油车之势;另一方面,5G、V2X通信等
It’s time to stop calling it “pig butchering” 不安全 2 months 1 week ago Online romance and investment scams are painful enough without its victims being described as "pig
Microsoft Purview – Evading Data Loss Prevention policies 不安全 2 months 1 week ago IntroductionMicrosoft Purview is a comprehensive solution that helps organizations manage an
How to Lose a Fortune with Just One Bad Click 不安全 2 months 1 week ago Image: Shutterstock, iHaMoo.Adam Griffin is still in disbelief over how quickly he was
EMBA firmware security analyzer v1.5.1 is available - "Rise from the dead" or "Binwalk is back in town" with improved SBOM generation, speed improvements and much more 不安全 2 months 1 week ago
CISA Orders Federal Agencies to Secure Microsoft 365 Environments 不安全 2 months 1 week ago OverviewThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has directed t
A new playground: Malicious campaigns proliferate from VSCode to npm 不安全 2 months 1 week ago ReversingLabs researchers have been monitoring multiple public repositories over the past few y
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? 不安全 2 months 1 week ago IntroductionTelegram, as previously reported by KELA, is a popular
企业上云的新攻击面分析 不安全 2 months 1 week ago 注1:本文引用的实际案例均来自业界公开渠道。注2:同一类云服务、功能在不同的云厂商可能叫法不同,例如AWS IAM和阿里云 RAM本质上是一个东西,本文默认使用AWS的定义。目录:• 前言• 攻击面概
Not Your Old ActiveState: Introducing our End-to-End OS Platform 不安全 2 months 1 week ago Having been at ActiveState for nearly eight years, I've seen many iterations of our product. Howev