Aggregator
Hackers’ Toolkit Exposed, Wide Range of Tools from Initial Access to Full Control
Cybersecurity researchers have discovered an extensive hacker toolkit, revealing a comprehensive set of tools designed for various stages of cyberattacks. The toolkit, found in an open directory, showcases the sophisticated methods employed by threat actors to gain and maintain access to compromised systems. The discovery, made in early December 2023, exposed a collection of batch […]
The post Hackers’ Toolkit Exposed, Wide Range of Tools from Initial Access to Full Control appeared first on Cyber Security News.
1,55 вольт и выше: Intel выяснила, что не так с чипами Raptor Lake на самом деле
「推安早报」0812 | bh议题节选、红蓝工具、漏洞情报
英国要发起一场“国家规模”的蜜罐计划
英国要发起一场“国家规模”的蜜罐计划
Vulnerabilities in Qualcomm’s Adreno GPU Chipsets Affect Billions of Android Devices
Google researchers have identified critical security vulnerabilities within Qualcomm’s Adreno GPU, potentially affecting billions of Android devices globally. If exploited, these vulnerabilities could lead to unauthorized access and control over affected devices, posing a substantial risk to users’ data and privacy. Qualcomm, a leading manufacturer of mobile processors and wireless chipsets, has confirmed the existence […]
The post Vulnerabilities in Qualcomm’s Adreno GPU Chipsets Affect Billions of Android Devices appeared first on Cyber Security News.
Critical Vulnerabilities in AWS Lets Attackers Gain Full-Service Remotely
Researchers from Aqua identified critical vulnerabilities in six Amazon Web Services (AWS): CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar. These vulnerabilities varied in severity, potentially allowing remote code execution, full-service user takeover, AI module manipulation, data exposure, data exfiltration, and denial of service (DoS) attacks. The vulnerabilities could have affected any organization using these services […]
The post Critical Vulnerabilities in AWS Lets Attackers Gain Full-Service Remotely appeared first on Cyber Security News.
timwhitez starred go-rawcopy
【活动最后一周】以下网络安全专家已免费获赠阿瑞斯武器库批量查询工具
近期值得关注的IOC(2024-08-12)
上周关注度较高的产品安全漏洞(20240805-20240811)
CNVD漏洞周报2024年第32期
蓄能作战力!成都链安“战法训练营”开课啦!
The BlackSuit ransomware gang has demanded over $500 million since 2022
安全热点周报:本周新增两个在野利用漏洞,系统安全不容小觑
Microsoft Reveals Iranian US Election Interference Ops
演讲议题巡展 | The Dark Side of the Browser
Как взломать сервер, просто слушая его
Google’s Quick Share Vulnerabilities Let Attackers Execute Remote Code
By reverse-engineering Quick Share’s proprietary communication protocol, researchers uncovered multiple vulnerabilities, including unauthorized file writes, forced Wi-Fi connections, directory traversal, and denial-of-service conditions. These flaws were chained together to achieve remote code execution on Windows systems with Quick Share installed, bypass file approval dialogs and establish persistent Wi-Fi connections. Google addressed these issues with two […]
The post Google’s Quick Share Vulnerabilities Let Attackers Execute Remote Code appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.