Aggregator
CVE-2024-48985 | MBed OS 6.16.0 HCI Packet buffer overflow
CVE-2024-48982 | MBed OS 6.16.0 HCI Parsing buffer overflow
CVE-2024-48983 | MBed OS up to 6.16.0 HCI Packet WsfMsgAlloc buffer overflow
CVE-2024-52702 | MyBB 1.8.38 install\index.php Website Name cross site scripting (Issue 4859)
悬赏400万美元,全球最大规模”零日探索”计划启动;墨西哥政府网站被勒索软件组织攻陷,313GB敏感政务数据或被公开 | 牛览
27天!揭秘身份管理中凭证修复为何如此艰难?
CVE-2024-10796 | ifso If-So Dynamic Content Personalization Plugin up to 1.9.2.1 on WordPress Shortcode ifso-show-post information disclosure
CVE-2024-10623 | EngineThemes ForumEngine Theme up to 1.8 on WordPress cross site scripting
CVE-2024-48986 | Mbed OS 6.16.0 HCI Parsing buffer overflow
CVE-2024-45663 | IBM DB2/DB2 Connect Server 11.1/11.5 Query denial of service
中国银联执行副总裁涂晓军:深耕行业、促进融合 共谱数字金融新乐章
Ford data breach involved a third-party supplier
CVE-2009-3748 | Websense Personal Email Manager up to 7.0 cross site scripting (EDB-9981 / Nessus ID 42292)
Five members of Scattered Spider cybercrime group charged for breaches, theft of $11 million
Phobos ransomware indictment sheds light on long-running, quietly successful scheme
Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay
Threat actors are exploiting a new cash-out tactic called “Ghost Tap” to siphon funds from stolen credit card details linked to mobile payment services like Google Pay or Apple Pay, which involves relaying NFC traffic, enabling unauthorized transactions without physical access to the victim’s device. By understanding this emerging threat, financial institutions can enhance their […]
The post Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Enhancing visibility for better security in multi-cloud and hybrid environments
In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the importance of real-time detection to protect against increasingly sophisticated attacks. Motta also shares practical advice for SMBs and organizations navigating compliance and cloud security challenges. How have cloud-specific threats evolved over the past few years, and what new … More →
The post Enhancing visibility for better security in multi-cloud and hybrid environments appeared first on Help Net Security.