Aggregator
Exploding Hezbollah Pagers Not Likely a Cybersecurity Attack
It doesn't appear to be a cyberattack, security experts said of the hundreds of pagers that blew up Tuesday across Lebanon, an apparent salvo against Hezbollah militants by the Israeli government. "The only logical explanation is that explosives and a side channel for detonation was likely used."
Apple Moves to Dismiss Suit Against Spyware Firm NSO Group
Apple has filed a motion to dismiss its lawsuit against NSO Group, citing concerns over the potential exposure of sensitive threat intelligence information. The tech giant believes continuing the lawsuit could compromise its ability to protect users and lead to the disclosure of sensitive data.
UK Orgs Tout Government Help in Ransomware Incidents
Timely notification of ransomware incidents to British law enforcement agencies played a crucial role in understanding the threats and in developing mitigation strategies, the former security heads of Royal Mail and the University of Manchester said.
Can CISA’s Federal Cybersecurity Alignment Plan Really Work?
The U.S. Cybersecurity and Infrastructure Security Agency has released a new plan to further align federal cybersecurity operations that experts say will likely face significant implementation roadblocks due to a lack of funding, leadership buy-in and technical resources.
CVE-2007-2854 | Bti-tracker 1.4.1 account_change.php langue sql injection (EDB-3970 / XFDB-34447)
[Meachines] [Medium] Cascade DC域+SMB+ldap查询+TightVNC 密码破译+.NET 应用分析+AD回收站凭据暴露权限提升
Kerbeus-BOF: Beacon Object Files for Kerberos abuse
Kerbeus-BOF Beacon Object Files for Kerberos abuse. This is an implementation of some important features of the Rubeus project, written in C. The project features integration with the C2 frameworks Cobalt Strike and Havoc. Ticket requests and renewals asktgt...
The post Kerbeus-BOF: Beacon Object Files for Kerberos abuse appeared first on Penetration Testing Tools.
Construction companies potentially vulnerable through accounting software, report says
AT&T pays $13 million FCC settlement over 2023 data breach
ggshield: Detect secret in source code, scan your repo for leaks
GitGuardian Shield: protect your secrets with GitGuardian GitGuardian shield (ggshield) is a CLI application that runs in your local environment or in a CI environment to help you detect more than 300 types of secrets,...
The post ggshield: Detect secret in source code, scan your repo for leaks appeared first on Penetration Testing Tools.
CVE-2024-46943 | OpenDaylight Authentication, Authorization and Accounting up to 0.19.3 Peer impersonation
CVE-2024-8779 | SYSCOM Group OMFLOW up to 1.2.1.2 Setting access control
CVE-2024-45694 | D-Link DIR-X5460 A1/DIR-X4860 A1 Web Service stack-based overflow
CVE-2024-46424 | TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 UploadCustomModule File buffer overflow
CVE-2024-46419 | TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 setWizardCfg ssid5g buffer overflow
CVE-2024-46451 | TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 setWiFiAclRules desc buffer overflow
CVE-2024-39772 | Mattermost Desktop App up to 5.8.0 access control
CVE-2024-45695 | D-Link DIR-X4860 A1 1.00/1.04 Web Service stack-based overflow
catalyst: automate alert handling and incident response processes
Catalyst Catalyst is an incident response platform or SOAR (Security Orchestration, Automation, and Response) system. It can help you to automate your alert handling and incident response procedures. Features Ticket (Alert & Incident) Management...
The post catalyst: automate alert handling and incident response processes appeared first on Penetration Testing Tools.