Aggregator
A Threat Actor Allegedly Leaked the Data of Chaat.fr
1 year 5 months ago
A Threat Actor Allegedly Leaked the Data of Chaat.fr
Dark Web Informer - Cyber Threat Intelligence
Крах лицензий: активация Windows без ключей теперь реальна
1 year 5 months ago
Хакеры смело бросили вызов Microsoft, открыв доступ почти ко всем версиям Windows и Office.
【摸鱼神器】在微信里看小说,文件传输助手还能这样用
1 year 5 months ago
【摸鱼神器】在微信里看小说,文件传输助手还能这样用
Russia sentences Hydra dark web market leader to life in prison
1 year 5 months ago
Russian authorities have sentenced the leader of the criminal group behind the now-closed dark web platform Hydra Market to life in prison. [...]
Sergiu Gatlan
Video: The Teenage Millionaire Hacker
1 year 5 months ago
Video: The Teenage Millionaire Hacker
Dark Web Informer - Cyber Threat Intelligence
The shocking speed of AWS key exploitation
1 year 5 months ago
It’s no secret that developers often inadvertently expose AWS access keys online and we know that these keys are being scraped and misused by attackers before organizations get a chance to revoke them. Clutch Security researchers performed a test to see just how quickly that can happen. They dispersed AWS access keys (in different scenarios) on: Code hosting and version control platforms: GitHub and GitLab Public code repositories: Docker Hub (for containers), npm (for JavaScript … More →
The post The shocking speed of AWS key exploitation appeared first on Help Net Security.
Zeljka Zorz
In Italia raddoppiano gli attacchi contro l’istruzione e il settore governativo e militare
1 year 5 months ago
In Italia raddoppiano gli attacchi contro l’istruzione e il settore governativo e militare
ENTHER EROR SYSTEM Defaced the Website of Mohan Build Care
1 year 5 months ago
ENTHER EROR SYSTEM Defaced the Website of Mohan Build Care
Dark Web Informer - Cyber Threat Intelligence
Name That Edge Toon: Shackled!
1 year 5 months ago
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.
John Klossner
Android security advisory – December 2024 Monthly Rollup (AV24-690)
1 year 5 months ago
Canadian Centre for Cyber Security
Novel phising campaign uses corrupted Word documents to evade security
1 year 5 months ago
Novel phising campaign uses corrupted Word documents to evade security
Google Chrome’s AI feature lets you quickly check website trustworthiness
1 year 5 months ago
Google Chrome’s AI feature lets you quickly check website trustworthiness
Zyxel security advisory (AV24-689)
1 year 5 months ago
Canadian Centre for Cyber Security
Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested
1 year 5 months ago
Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested
AI 应用无代码开发教程:工作流模式详解
1 year 5 months ago
AI 应用无代码开发教程:工作流模式详解
Minister bezoekt militairen in Estland: "Jullie inzet is onmisbaar"
1 year 5 months ago
Defensieminister Ruben Brekelmans bracht vandaag een bezoek aan de ongeveer 150 militairen op Ämari Airbase in Estland. Het detachement van de luchtmacht zet zich hier in voor de bewaking van het NAVO-luchtruim boven Oost-Europa. Daarnaast bezocht de minister marinefregat Zr. Ms. Van Amstel, gelegen voor de Estse kust.
DarkRaaS and CornDB: Evidence of a Coordinated Network?
1 year 5 months ago
DarkRaaS and CornDB: Evidence of a Coordinated Network?
CVE-2000-0118 | Red Hat Linux up to 6.1 su privileges management (EDB-19255 / BID-320)
1 year 5 months ago
A vulnerability classified as critical was found in Red Hat Linux up to 6.1. Affected by this vulnerability is an unknown functionality of the component su. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2000-0118. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Дипфейки больше не пройдут: Hiya рушит грезы мошенников за секунду
1 year 5 months ago
Новая система для распознавания подделок быстро завоевала сердца пользователей.