Aggregator
【资料】美军总结的我军战术
1 week 1 day ago
也不知道美军对我军的战术总结得怎样,他们真的对我军了解吗?
Ghost Tap: масштабное мошенничество с банковскими картами стало реальностью
1 week 1 day ago
Тот случай, когда ваш телефон выступает главным инструментом хакеров.
CVE-2008-5732 | KafooeyBlog 1.55b File Upload lib/image_upload.php input validation (EDB-7537 / XFDB-47535)
1 week 1 day ago
A vulnerability was found in KafooeyBlog 1.55b. It has been classified as critical. This affects an unknown part in the library lib/image_upload.php of the component File Upload. The manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2008-5732. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2008-5725 | Entechtaiwan PowerStrip up to 3.84 access control (EDB-7533 / XFDB-47532)
1 week 1 day ago
A vulnerability was found in Entechtaiwan PowerStrip. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to improper access controls.
This vulnerability is handled as CVE-2008-5725. An attack has to be approached locally. Furthermore, there is an exploit available.
vuldb.com
CVE-2008-5735 | CoolPlayer 2.17/2.18/2.19 skin.c memory corruption (EDB-7536 / XFDB-47527)
1 week 1 day ago
A vulnerability classified as very critical has been found in CoolPlayer 2.17/2.18/2.19. Affected is an unknown function of the file skin.c. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2008-5735. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2008-5852 | Emefa Guestbook 3.0 access control (EDB-7534 / XFDB-47534)
1 week 1 day ago
A vulnerability was found in Emefa Guestbook 3.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2008-5852. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2008-2186 | Cilekyazilim ChiCoMaS 2.0.4 index.php q cross site scripting (EDB-7532 / XFDB-42156)
1 week 1 day ago
A vulnerability classified as problematic was found in Cilekyazilim ChiCoMaS 2.0.4. This vulnerability affects unknown code of the file index.php. The manipulation of the argument q leads to cross site scripting.
This vulnerability was named CVE-2008-2186. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2008-5853 | ChiCoMaS 2.0.3/2.0.4 backup access control (EDB-7532 / SA30080)
1 week 1 day ago
A vulnerability was found in ChiCoMaS 2.0.3/2.0.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file backup. The manipulation leads to improper access controls.
This vulnerability is known as CVE-2008-5853. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
Logistiek Centrum Soesterberg komt van de grond
1 week 1 day ago
Toekomstbestendig, duurzaam en vooral: effectief. Het Logistiek Centrum Soesterberg (LCS) wordt hét nieuwe logistieke knooppunt voor de Koninklijke Landmacht. Vandaag werd de eerste paal van het gebouw in de grond geslagen op Kamp Soesterberg. De realisatie gebeurt in samenwerking met verschillende civiele partners, onder leiding van Rhenus Logistics.
Kubernetes(K8S)集群服务器取证详解
1 week 1 day ago
跨国抓捕:俄罗斯勒索软件头目被引渡至美国
1 week 1 day ago
error code: 521
CVE-2024-10094 | Pegasystems Pega Infinity up to 24.1.1 code injection
1 week 1 day ago
A vulnerability classified as critical has been found in Pegasystems Pega Infinity up to 24.1.1. This affects an unknown part. The manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2024-10094. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
苹果计划授权其 Apple TV+独占内容
1 week 1 day ago
苹果计划向竞争对手的流媒体服务授权 Apple TV+ 的独占内容,此举旨在节省资金和扩大影响面。自 2019 年 Apple TV+ 推出以来,苹果斥资逾 200 亿美元打造原创内容。但
Apple Urgently Patches Actively Exploited Zero-Days
1 week 1 day ago
Though information regarding the exploits is limited, the company did report that Intel-based Mac systems have been targeted by cybercriminals looking to exploit CVE-2024-44308 and CVE-2024-44309.
Dark Reading Staff
Products in evaluation
1 week 1 day ago
Canadian Centre for Cyber Security
После прочтения сжечь: как Google стирает улики и уклоняется от судебных исков
1 week 1 day ago
Корпорацию обвиняют в намеренном удалении доказательств и сокрытии фактов.
Small US Cyber Agencies Are Underfunded & That's a Problem
1 week 1 day ago
If the US wants to maintain its lead in cybersecurity, it needs to make the tough funding decisions that are demanded of it.
Michael Daniel
Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses
1 week 1 day ago
Cyber attacks are more sophisticated than ever, from ransomware and phishing to DDoS attacks. This post explores these threats and provides actionable insights into building robust defenses. Learn how to implement security best practices and protect your valuable data from modern cyber attacks.
The post Modern Cyber Attacks: Understanding the Threats and Building Robust Defenses appeared first on Security Boulevard.
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
1 week 1 day ago
Cyber Espionage / Telecom SecurityA new China-linked cyber espionage group has been attributed as