Aggregator
CVE-2018-19410 | PRTG Network Monitor up to 18.2.40 /public/login.htm HTTP Request access control (ID 13352)
RansomHub
Cybercriminals shift focus to social media as attacks reach historic highs
A new report from Gen highlights a sharp rise in online threats, capping off a record-breaking 2024. Between October and December alone, 2.55 billion cyber threats were blocked – an astonishing rate of 321 per second. The risk of encountering a threat climbed to 27.7% in Q4, with social engineering attacks accounting for 86% of all blocked threats. This underscores the increasingly sophisticated psychological tactics cybercriminals are using to deceive victims. “We’re continuing to see … More →
The post Cybercriminals shift focus to social media as attacks reach historic highs appeared first on Help Net Security.
DEF CON 32 – Manufacturing Lessons Learned, Lessons Taught
Authors/Presenters: Tim Chase
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Manufacturing Lessons Learned, Lessons Taught appeared first on Security Boulevard.
CVE-2025-1447 | kasuganosoras Pigeon 1.0.177 index.php url server-side request forgery
Citrix security advisory (AV25-094)
SecWiki News 2025-02-18 Review
DeepSeek 本地部署指南 by ourren
FlowPic:一种通用的加密流量分类与应用识别表示方法 by ourren
AI-Infra-Guard: AI基础设施安全评估系统 by ourren
更多最新文章,请访问SecWiki
Submit #494788: Hangzhou Synway Digital Information Technology Co.,Ltd. SMG Gateway Management Software 9-12ping.php Command Injection [Accepted]
Submit #501978: https://github.com/kasuganosoras/Pigeon Pigeon v1.0.177 SSRF [Accepted]
Brekelmans waarschuwt: “Agressie Rusland is allesverwoestend”
Bruce Schneier 认为我们的隐私仍然被大规模收集
New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now
微软推出修复华硕蓝屏问题的 BIOS 更新
Juniper Networks security advisory (AV25-093)
Learn & Avoid Social Engineering Scams in 2025
In the past decade, social engineering attacks have become more sophisticated and prevalent than ever. From AI voice impersonation to deepfake video calls, cybercriminals are leveraging the latest technology to make their scams increasingly convincing. Despite growing awareness of these threats, social engineering remains one of the most successful attack methods because it exploits something technology can't secure—human psychology.
More than 70% of successful breaches start with social engineering attacks. Whether you're a business professional, student, or retiree, understanding how these scams work is your first line of defense.
The post Learn & Avoid Social Engineering Scams in 2025 appeared first on Security Boulevard.
马斯克与 OpenAI 的交锋:收购提案遇冷,立场分歧引争议
Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks
CVE-2024-57045 | D-Link DIR-859 A3 up to 1.05 /getcfg.php improper authentication
Unit21 empowers financial institutions to detect and stop scams
Unit21 launched its new scams solution that helps financial institutions and fintechs detect and stop scams before they cause financial harm. Using AI automation, the new solution can be integrated into a fraud team’s workflow to accelerate investigations and response times while also incorporating IP insights and consortium signals to prevent and detect scams before they hit consumer financial accounts. Advancements in technology have allowed criminals to scam consumers and businesses at unprecedented speed and … More →
The post Unit21 empowers financial institutions to detect and stop scams appeared first on Help Net Security.