Aggregator
CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment
CAPE, derived from Cuckoo v1, is a sophisticated malware sandbox designed to execute malicious files in an isolated environment while capturing their dynamic behavior and collecting forensic artifacts. This platform enhances Cuckoo’s capabilities by incorporating automated dynamic malware unpacking, YARA-based classification of unpacked payloads, and both static and dynamic malware configuration extraction. CAPE also features […]
The post CAPE from Cuckoo v1 Enables Malware Analysis in a Secure Isolated Sandbox Environment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Keymous Targeted the Website of Belgium Police
Прорыв в Делфте: паруса с нанодырками достигают 20% скорости света
Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials
SnakeKeylogger, a sophisticated multistage malware, has emerged as a significant threat to both individuals and businesses by targeting sensitive login credentials. This malware campaign is characterized by its stealthy in-memory execution and multi-stage infection chain, making it challenging to detect. The attack begins with a malicious spam email containing a .img file attachment, which, when […]
The post Multistage Info-Stealer SnakeKeylogger Targets Individuals and Businesses to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
VMware security advisory (AV25-163)
CVE-2024-23094 | flusity CMS 2.33 edit_addon_post.php cross-site request forgery
CVE-2024-31003 | Axiomatic Bento4 1.6.0-641 Ap4ByteStream.cpp WritePartial buffer overflow (Issue 939)
CVE-2024-30915 | OpenDDS b1c534032bb62ad4ae32609778de6b8d6c823a66 DataReaderQoS max_samples denial of service (Issue 4527)
CVE-2024-33443 | onethink 1.1 AddonsController.class.php code injection (Issue 40)
CVE-2024-3477 | Popup Box Plugin up to 2.2.6 on WordPress cross-site request forgery
CVE-2024-33408 | Campcodes Complete Web-Based School Management System 1.0 /model/get_classroom.php ID sql injection
CVE-2024-33410 | Campcodes Complete Web-Based School Management System 1.0 delete_range_grade.php ID sql injection
CVE-2024-33406 | Campcodes Complete Web-Based School Management System 1.0 delete_student_grade_subject.php index sql injection
CVE-2024-33407 | Campcodes Complete Web-Based School Management System 1.0 /model/delete_record.php ID sql injection
CVE-2024-33404 | Campcodes Complete Web-Based School Management System 1.0 add_student_first_payment.php index sql injection
CVE-2024-33405 | Campcodes Complete Web-Based School Management System 1.0 add_friends.php friend_index sql injection
CVE-2015-6420 | Cisco Products Apache Commons Collections Library deserialization (cisco-sa-20151209-java-deseria / VU#581311)
Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA)
How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors.
The post Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA) appeared first on Security Boulevard.