Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
Alarming Decline in Cybersecurity Job Postings in the US
French hospital impacted by cyberattack
Octopharma Plasma's US operations shut down due to suspected ransomware attack
BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
How Attackers Can Own a Business Without Touching the Endpoint
Unlocking the Power of Portfolio Analysis - A Comprehensive Guide
Talos "In the Headlines"
What’s the deal with the massive backlog of vulnerabilities at the NVD?
Akira Ransomware Group Rakes in $42m, 250 Organizations Impacted
How ADR – application detection and response – can become the ‘EDR for apps’
FBI chief says China is preparing to attack US critical infrastructure
LastPass users targeted by vishing attackers
AuditBoard expands executive team to support the next phase of growth
'MagicDot' Windows Weakness Allows Unprivileged Rootkit Activity
United Nations Development Programme (UNDP) investigates data breach
Hackers Target Middle East Governments with Evasive "CR4T" Backdoor
Unveiling Access Control Flaws: Taking over an entire organization | by mohamed othman | Apr, 2024 | Medium
New infosec products of the week: April 19, 2024
Protobom: Open-source software supply chain tool
The key pillars of domain security
JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener
Cyberattack Takes Frontier Communications Offline
IDOR Lead to Data Leak. Hello, hackers. My name is Mostafa… | by Mostafa Elguerdawi | Apr, 2024 | Medium
A Beginner’s Guide To Insecure Deserialization | by four0four | Apr, 2024 | Medium
51% of enterprises experienced a breach despite large security stacks
Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware
DarkGPT — AI OSINT Tool Powered By ChatGPT-4 To Detect Leaked Databases | by Itsmeanzee | Apr, 2024 | Medium
Fake cheat lures gamers into spreading infostealer malware
From Hackers to Streakers – How Counterintelligence Teams are Protecting the NFL – Joe McMann – ESW #358
Frontier Communications shuts down systems after cyberattack
Porter Airlines Cybersecurity Consolidation
Protecting Employees' Sensitive Data on the Web
ICS Network Controllers Open to Remote Exploit, No Patches Available
Cisco Warns of Massive Surge in Password Spraying Attacks on VPNs
GPT-4 Can Exploit Most Vulns Just by Reading Threat Advisories
Auburn's McCrary Institute and Oak Ridge National Laboratory to Partner on Regional Cybersecurity Center
For Service Accounts, Accountability Is Key to Security
Microsoft finds Kubernetes clusters targeted by OpenMetadata exploits
8Base Ransomware Claims Breach On Atlantic States Marine Fisheries Commission | Daily Security Review
840-bed hospital in France postpones procedures after cyberattack
FBI: Akira ransomware raked in $42 million from 250+ victims
Russian APT Group Thwarted in Attack on US Automotive Manufacturer
‘MadMxShell’ leverages Google Ads to deploy malware via Windows backdoor
FIN7 targeted a large U.S. carmaker phishing attacks
Could the Brazilian Supreme Court finally hold people accountable for sharing disinformation?
Google ad impersonates Whales Market to push wallet drainer malware
Microsoft Office LTSC 2024 preview available for Windows, Mac
Russia’s Sandworm Upgraded to APT44 by Google's Mandiant
Quishing Attacks Jump Tenfold, Attachment Payloads Halve
Law enforcement operation dismantled phishing-as-a-service platform LabHost
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
Cybercriminals pose as LastPass staff to hack password vaults
Rebalancing NIST: Why 'Recovery' Can't Stand Alone
Uncovering DDoS Vulnerabilities with Simulation Testing: A Case Study
New Cyber-Threat MadMxShell Exploits Typosquatting and Google Ads
Bill restricting personal data purchases gains House OK
Russia’s Sandworm APT linked to attack on Texas water plant
Open Source Tool Looks for Signals in Noisy AWS Cloud Logs
Break Security Burnout: Combining Leadership With Neuroscience
Countering Voice Fraud in the Age of AI
US election-targeted influence operations by Russia ramp up
New attack campaign involves Fortinet FortiClient vulnerability exploitation
Novel Kapeka backdoor leveraged in Sandworm attacks
Ransomware attack compromises UN agency data
US automaker subjected to FIN7 attack
Unpacking the NIST cybersecurity framework 2.0
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
Gurucul federated search provides insights into data that is not centralized
Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide
How to Conduct Advanced Static Analysis in a Malware Sandbox
New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks
Recover from Ransomware in 5 Minutes—We will Teach You How!
Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)
Immuta launches Domains policy enforcement to improve security and governance for data owners
US Election Officials Told to Prepare for Nation-State Influence Campa
Six ways to fend off spam in corporate networks
Previously unknown Kapeka backdoor linked to Sandworm APT
Authorities take down LabHost, phishing-as-a-service platform
Redgate Monitor Enterprise prevents unauthorized access to sensitive information
SAS unveils products and services to help customers embrace AI
LabHost phishing service with 40,000 domains disrupted, 37 arrested
Nigeria, Romania Ranked Among Top Cybercrime Havens
Sneaky Shellcode: Windows Fibers Offer EDR-Proof Code Execution
Trust in Cyber Takes a Knock as CNI Budgets Flatline
UK Police Lead Disruption of £1m Phishing-as-a-Service Site LabHost
Open Source Intelligence Tools & Techniques Explained With Case Studies | by Motasem Hamdan | Apr, 2024 | Medium
Cisco warns of a command injection escalation flaw in its IMC
Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)
6 Phone Management Tips When Traveling Abroad
ICS/OT Penetration Testing of Schneider Modicon TM221: A Beginner’s Guide | by Marcel Rick-Cen | Apr, 2024 | Medium
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Bots dominate internet activity, account for nearly half of all traffic
Who owns customer identity?
Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate
Enterprises face significant losses from mobile fraud
The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt
92% of enterprises unprepared for AI security challenges
Crazy Crypto: Meet CVE-2024–31497 | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Apr, 2024 | Medium
SoumniBot malware exploits Android bugs to evade detection
FIN7 targets American automaker’s IT staff in phishing attacks
Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks
Dangerous New ICS Malware Targets Orgs in Russia and Ukraine
Redgate Launches Enterprise Edition of Redgate Monitor
Brute-force attacks surge worldwide, warns Cisco Talos   
Hacker Heroes – Winn Schwartau – PSW #825
Moldovan charged for operating botnet used to push ransomware
Charlotte AI’s Multi-AI Approach
Ivanti Releases Fixes for More Than 2 Dozen Vulnerabilities
Active Kubernetes RCE Attack Relies on Known OpenMetadata Vulns
A peek inside Inferno Drainer. Inferno Drainer is a widely used piece… | by Bernhard Mueller | Apr, 2024 | Medium
Linux variant of Cerber ransomware targets Atlassian servers
Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform
Cerebral Settles Suit At $7 Million In Facebook Pixel Data Leak Case | Daily Security Review
Ivanti Issues Security Updates To Critical Flaws In Avalanche MDM Solution | Daily Security Review
UnitedHealth Reports That Change Healthcare Cyberattack Caused $872 Million Loss | Daily Security Review
If You Want To Be A CISO, Then Read This First … | by Taimur Ijlal | Apr, 2024 | InfoSec Write-ups
Investigating The Files With Forensics | CTF Newbies | by HackTheBox SRMIST | Apr, 2024 | InfoSec Write-ups
My Journey with CRTO: A Review. I’m excited to announce my recent… | by JustAnother-Engineer | Apr, 2024 | InfoSec Write-ups
NTFS Filesystem: Alternate Data Stream (ADS) | by David Varghese | Apr, 2024 | InfoSec Write-ups
Storm Breaker: Unveiling the Power of the Social Engineering Tool | by ElNiak | Apr, 2024 | InfoSec Write-ups
The Impact of Cyberattacks on Brand Reputation: How to Minimise Damage | by LucyCouser13 | Apr, 2024 | InfoSec Write-ups
Turning Wayback Machine Into GOLD MINING MACHINE | by Ott3rly | Apr, 2024 | InfoSec Write-ups
Tutorial on x86 Architecture: From Basics to Cybersecurity Links | by ElNiak | Apr, 2024 | InfoSec Write-ups
XSS Unpacked: What It Is, How It Works, and How to Stop It | by Fahri Yeşil | Apr, 2024 | InfoSec Write-ups
Acoustic Side Channel Attacks on Keyboards: A Deep Dive into Typing Patterns and Security Implications | by ElNiak | Apr, 2024 | InfoSec Write-ups
Breaking Safeguards: Unveil “Many-Shot Jailbreaking” a Method to Bypass All LLM Safety Measures | by ElNiak | Apr, 2024 | InfoSec Write-ups
Creating Payloads with ScareCrow to Mimic Reputable Sources and Bypass Anti-Virus | by Cybertech Maven | Apr, 2024 | InfoSec Write-ups
CVE-2024–3400: A Critical Vulnerability in PAN-OS Firewalls | by ElNiak | Apr, 2024 | InfoSec Write-ups
How I Hack Web Applications (Part 1) | by Rafin Rahman Chy | Apr, 2024 | InfoSec Write-ups
Marine Corps’ overseas cyber force mission seeks stronger critical infrastructure defenses
Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)
Cisco discloses root escalation flaw with public exploit code
Russian Sandworm hackers pose as hacktivists in water utility breaches
Enterprise Endpoints Aren't Ready for AI
Linux Cerber Ransomware Variant Exploits Atlassian Servers
Bot attacks spike
US jails former Amazon security engineer for DeFi hacks
New ODNI data acquisition guidance imminent
Total Cyber Command hunt forward missions disclosed for the first time
Dark Web Monitoring: What's the Value?
Microsoft: Copilot ‘app’ on Windows Server mistakenly added by Edge
How Boards Can Prepare for Quantum Computers
Preparing for Cyber Warfare: 6 Key Lessons From Ukraine
Various Botnets Pummel Year-Old TP-Link Flaw in IoT Attacks
US Government and OpenSSF Partner on New SBOM Management Tool
North Korean Group Kimsuky Exploits DMARC and Web Beacons
Scammers offer cash to phone carrier staff to swap SIM cards
Total ransomware payment ban requires more prep
What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
Multiple botnets exploiting one-year-old TP-Link flaw to hack routers
UK e-visa rollout starts today for millions: no more physical immigration cards
Microsoft: New Copilot app added by Edge doesn’t collect data
DDoS attacks spike in first quarter
Over two dozen Ivanti Avalanche vulnerabilities addressed
Ransomware attacks against food, agriculture industry examined
Updated LightSpy spyware targeted at South Asia
Russian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacks
Access Limitless Global Content: How Residential Proxies Enable It 
Armis acquires Silk Security for $150 million
OfflRouter virus causes Ukrainian users to upload confidential documents to VirusTotal
Ivanti fixed two critical flaws in its Avalanche MDM
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
GenAI: A New Headache for SaaS Security Teams
Sandworm Is Russia's Top Cyberattack Unit in Ukraine
Pro-Russian Campaign Exploits Meta’s Failure to Moderate Political Ads
Make Money 💸 Using Google Hacking | by Ott3rly | Apr, 2024 | Medium
Meeting Man Who Broke North Korea’s Internet & iPhones Under Attack, Cyber News Beat | by Michael Lopez | Apr, 2024 | Medium
How AI-powered IAM can bolster security
68% of Companies are More Vulnerable to DDoS Than They Think
Insider Threats Surge 14% Annually as Cost-of-Living Crisis Bites
Ivanti Patches Two Critical Avalanche Flaws in Major Update
‘Junk gun’ ransomware: Peashooters can still pack a punch
Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services
Cyberattacks Surge 325% in Philippines Amid South China Sea Standoff
Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
Researchers released exploit code for actively exploited Palo Alto PAN-OS bug
Israel Holds Hybrid Cyber & Military Readiness Drills
Russian Sandworm Group Using Novel Backdoor to Target Ukraine
Cisco warns of large-scale brute-force attacks against VPN and SSH services
Damn Vulnerable RESTaurant: Open-source API service designed for learning
Thinking outside the code: How the hacker mindset drives innovation
IT and security professionals demand more workplace flexibility
Understanding next-level cyber threats
Cybersecurity jobs available right now: April 17, 2024
UK e-visa rollout begins today: no more immigration cards for millions
Experts Warn of Voice Cloning-as-a-Service
Forensics Chall: Bluetooth For The Win(Shunya CTF Arambha) Writeup | by Anant | Apr, 2024 | Medium
Unauthorized Admin Account Access via Google Authentication | by Sahil Mehra | Apr, 2024 | Medium
Blockchain - Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs
T-Mobile, Verizon workers get texts offering $300 for SIM swaps
Delinea Fixes Flaw After Analyst Goes Public With Disclosure First
🌵Unauthenticated Cache Purging Vulnerability | by AbhirupKonwar | Apr, 2024 | Medium
2x2TB USB Disks for £58!. I received this advert for a 2TB USB on… | by Prof Bill Buchanan OBE | Apr, 2024 | Medium
Critical vulnerability in PuTTY exposes private keys | by Patrik Žák | Apr, 2024 | Medium
The Future of Business Communications: Trends Shaping the Industry
Cerebral to pay $7 million settlement in Facebook pixel data leak case
Kim Larsen New Chief Information Security Officer at SaaS Data Protection Vendor Keepit
BeyondTrust Acquires Entitle, Strengthening Privileged Identity Security Platform
Kaspersky Unveils New Flagship Product Line for Business, Kaspersky Next
RansomHub says Change Healthcare data now up for sale
Exploit released for Palo Alto PAN-OS bug used in attacks, patch now
Google to crack down on third-party YouTube apps that block ads
Ivanti warns of critical flaws in its Avalanche MDM solution
Global Cybercriminal Duo Face Imprisonment After Hive RAT Scheme
Omni Hotels confirms data compromise in apparent ransomware attack
Duo, Steganography, Roku, Palo Alto, Putty, Cerebral, IPOs, SanDisk, & Josh Marpet – SWN #378
PuTTY SSH Client flaw allows of private keys recovery
New Vulnerability "LeakyCLI" Leaks AWS and Google Cloud Credentials
Cisco warns of large-scale brute-force attacks against VPN services
Name That Toon: Last Line of Defense
PuTTY vulnerability can be exploited to recover private keys (CVE-2024-31497)
How I got JS Execution (DOM XSS) Via CSTI | by Amr | Apr, 2024 | Medium
How to Learn Cybersecurity at Home | by Tyler Wall | Mar, 2024 | Medium
Harnessing AI for Enhanced Cybersecurity Defenses | Medium
Can we trust AI to take care of us? | by Linda Margaret | Brain Labs | Apr, 2024 | Medium
Delinea has cloud security incident in Thycotic Secret Server gaffe | by Kevin Beaumont | Apr, 2024 | DoublePulsar
Explore topics
Sanitising Your Git History. How to clear your Git to improve… | by Jake Teo | Apr, 2024 | Level Up Coding
Upgrades!!! — Everything new with Kubernetes 1.30 | by Imran Roshan | Google Cloud - Community | Mar, 2024 | Medium
My Grandfather Didn’t Trust Banks. Now, Digital Banking Makes People Feel the Same Way. | by George “Ace” Acevedo | ILLUMINATION-Curated | Apr, 2024 | Medium
Medium
Attempted XZ Utils backdoor-like hijacking thwarted
A renewed espionage campaign targets South Asia with iOS spyware LightSpy
OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt
Cisco Duo provider breached, SMS MFA logs compromised
Vercara UltraEdge offers protection against internet-based threats
PuTTY SSH client flaw allows recovery of cryptographic private keys
UnitedHealth: Change Healthcare cyberattack caused $872 million loss
How to make your web apps resistant to social engineering
3 Steps Executives and Boards Should Take to Ensure Cyber Readiness
The Importance of OT Security: The Evolving Threat Landscape – Ken Townsend – CSP #170
Cisco Duo customer MFA message logs stolen in supply chain hack
LastPass users targeted in phishing attacks good enough to trick even the savvy | Ars Technica
UK cyber agency NCSC announces Richard Horne as its next chief executive
PVML receives $8 million in Seed for its secure AI-powered data access platform | Ctech
How Hackers Use Wireshark for Password Sniffing: What does Wireshark do? - HackProofHacks
UK police bust worldwide million-dollar crime-as-a-service hub LabHost | TechFinitive
✂️ The hazards of locksport - YouTube
SEC.gov | Request Rate Threshold Exceeded
Federal Bureau of Investigation
Project Zero: The Windows Registry Adventure #1: Introduction and research results
A Super In-depth Look At The REPLICANT from Covert Instruments - YouTube
Web API Security Champion: Broken Object Level Authorization (OWASP TOP 10) | DevSec Blog
Replicant Mold and Cast Instructional - YouTube
Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials
Introducing Cloud Console Cartographer: An Open-Source Tool To Help Security Teams Easily Understand Log Events Generated by AWS Console Activity
Breaking Custom Encryption Using Frida (Mobile Application Pentesting) | Cognisys Labs
How to combat generative AI security risks | LeadDev
Shielder - Element Android CVE-2024-26131, CVE-2024-26132 - Never Take Intents From Strangers
892. American 1100 padlock picked open with cheap budget modified half snowman lock pick - YouTube
503 - Service Unavailable Error
American Lock 2500 picked and gutted! - YouTube
An Obscure Actions Workflow Vulnerability in Google’s Flank – Adnan Khan's Blog
Paclock PL410-pro pick - YouTube
Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters | Microsoft Security Blog
Malicious cyber activity spiking in Philippines, analysts say
A Quick Review, Pick & Bypass: Masterlock 141d - YouTube
Exposing Misinformation About Jailbroken Firestick and Jail Time
Ransomware Simulation Discussion - YouTube
Find and Fix an LLM Jailbreak in Minutes
A quick post on Chen’s algorithm – A Few Thoughts on Cryptographic Engineering
A quick post on Chen’s algorithm – A Few Thoughts on Cryptographic Engineering
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
CVE-2024-2448: Authenticated Command Injection In Progress Kemp LoadMaster - Rhino Security Labs
Critical Analysis of Agentless Vulnerability Scans in Cloud - Deepfence
Flying Number 7 - YouTube
See How It ALL Could Go Wrong When Gutting A Lock | How NOT To Gut A Lock - YouTube
Evaluating the Impact of CISA’s Secure Software Development Attestation on Government Software Integrity | by ZENcurity | Technology Hits | Apr, 2024 | Medium
LeakyCLI: AWS & Google Cloud Command Line Tools | Orca Security
“All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass | by Johnny Yu (@straight_blast) | Apr, 2024 | Medium
SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world
first-security-app
OnlineHacking-FreeFire-Phishing.
OnlineHacking-FreeFire-Phishing
try to hack me..!
A list of awesome cloud security events
Here i Explore Hacker News Posts to analyze which are the best hours to post an Ask HN post in order to get the most ammount of responses (comments)
Created a replica Instagram login page for educational purposes, demonstrating phishing techniques used by hackers.
Hardware-Security-Analysis
Java-Spring-Security-Project
WiFi Hacking with an ESP8266 - Deauth combined with Evil Twin attack
Proyecto pwa
testSecurity
This is a repository for practical part of bachelor thesis "Security analysis of blockchain consensus protocols".
myAdvancedSecurityOrgLevel
BackEnd Made with Spring Boot, Spring Data, Spring Web MVC, Spring Validation, Spring Security, Lombok, Model Mapper, Jackson, MySQL and JWT.
OnlineHacking-Freefire-Phishing
AD_Network CRUD with Spring Boot, Spring Security, Thymeleaf, Spring Data JPA, SQL Server
Projeto AWA para gameficação do aprendizado!
Vertex AI proof of concept.
pseudo-cancelated holes, proof of concept
Java-Spring-Boot-Security-Project-1.0
Proof of Concept of Door Lock with input of keypad with Arduino and C
Hacking Web3 team
91 club hack app
Proof of Concept on Dask Distributed Computation
Proof of Concept on Ray.io
hacking-tools
HACK-AI-THON 2023
Hacker News stories respository used to search stories from Hacker news API
Implemented DevOps practices to deploy a scalable gaming app on Amazon EKS. Utilized Fargate, Kubernetes resources, Ingress, and ALB for external access. Configured Ingress Controller, reducing load balancer costs. Achieved scalability, availability, and
A Simple JS Hack For Memrise To Get Easy Points
ENGR101-RubySecurity
This is the code for a python GUI app made for an IoT project.
Lit 🔥 review application proof of concept for data structures and algorithms group project
project which shows 2 step gate security system. It focuses on arduino.
A proof of concept for Sportson app.
A Rate-Limiter-Service proof of concept which would act as rate limiter to provide a middleware service
this repository includes a simple Python script using the Pandas library, which allows you to analyze the main metrics provided as part of the "Tender Hack", which was held in the city of Vladivostok on April 19 - April 21
CyberSecurity-NM
Repository for 9-hacks. A webapp for streamlining the process of interaction between students/faculty and the consellors.
This is a proof of concept
Proof-of-concepts implementation of the Merkle Datasets approach
DSTU HACK 2024
Android WebView Exploit Using Java Proof Of Concept
Hacking SQL Server .bak files
Some good practices to improve security on RHEL-based servers
The editor used to make animations for the Purdue Hackers' Sign
Projects that i made during the learning phrase
This plugin allows administrators to change the base URL prefix of the WordPress REST API, facilitating simple and failproof customization for security or branding purposes.
WebVTT Same-Origin Proof of Concept
pak of hacker
Hacker ho
springSecurity
Alfa hack
100 Days of Swift Project 1
External Game Project primarily written in C++, utilizing external libraries. Im actively combating scammers while developing various cheats and tools for games, including Hack Cheat Driver Esp Aimbot Magic Bullet, Driver Injector Overlay, and Imgui.
THE HACK
URI bootcamp homework 21. Convert REST to Graph QL, add security for Book Search App. MJS 4.18.24
GO, hacking, experimenting & personal notes
Information-Security-MiniProject
Template for Spring Security
Proof-Of-Concept
Ap2_TrabalhoSecurity
Im actively combating scammers while developing various cheats and tools for games, including Hack Cheat Driver Esp Aimbot Magic Bullet, Driver Injector Overlay, and Imgui
proof of concept for recursive searches and anayltics
Cyber-security-project
DDOS-Hacker v2024
sandbox_spring-security
A simple and lightweight Laravel package for generating and verifying one-time passwords (OTPs), enhancing authentication security in your Laravel applications.
Hacking_Phishing
Using spring boot,spring security,jwt token
Train security system
Hacking
cyber-security
It is a web-based dairy shop management system utilizing MySQL Server and PHP technologies for streamlined workflow automation and invoice management with robust security measures.
`Interactive App and Game Design with Unity` - LA Hacks Workshop 2024
experience-primer-copilot-SanWang-hack created by GitHub Classroom
A proof of concept containing several UI libs
Proof of concept of Tauvlo marketplace.
Репозиторий для хакатона Alfa x FinU Hack
My final project for Information Design. The task was to select a real-world issue and create something based on it, so I chose cybersecurity (with an emphasis on phishing and password security) and created a website.
my small projects script
Final course project for CSE350: Network Security
Some helpfull proof of concept starter template
layer0-solana-ai-security
With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria
Counter Strike 2 cheat, CS 2 hack, CS2 Aimbot, CS2 Bunnyhop, Faceit driver Cheat
With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria
Testing Streamlit development with this proof-of-concept
Stay updated with real-time notifications for Hacker News posts. Get desktop alerts for high-priority topics and browse latest news effortlessly.
Demo app com spring boot 3, spring security e oauth2
Call of Duty Warzone has gained significant popularity over time, attracting millions of global players. Lavicheats offers cheats and hacks that can give you an unbeatable
Data for global food security
WebVTT Cross-Origin Proof of Concept
PasswordChecker is a tool for verifying the reliability of passwords, taking into account certain security requirements.
Bot game about a hacker cat
KEYLOGGER & SECURITY
AI-Security-
SecureOTP is a powerful WordPress plugin designed to enhance security and streamline form submissions on your website. With SecureOTP, you can easily implement OTP (One-Time Password) verification for user phone numbers, ensuring secure access and reducin
Become an ethical hacker
Web application interface for a smart home security system. This web app allows users to access stored files in cloud storage through a log in system.
Hacker news
proof of concept project
Enhance the security of your KeyAuth ImGui example by implementing server-side controls, packet encryption, and single-use packets, offering robust protection against unauthorized access.
A simple and lightweight Laravel package for generating and verifying one-time passwords (OTPs), enhancing authentication security in your Laravel applications.
AN EXPERIMENT ON VAULTS SECURITY
keepass-http-security
Hacking
Hwid Spoofer is a C# application that enables you to alter various system identifiers on your Windows computer, offering randomization of critical identifiers like HWID, PC GUID, computer name, product ID, and even MAC address. This tool allows for enhanc
flutter_app_security_detected
REALLY SIMPLE AND PROOF OF CONCEPT space invaders game for ti-84
PHP based sign up form with security and password hashing. And also error managed through try and Catch block of code.
Multiplatform proof of concept C++ TCP back and forth comminication
A ton of different game hacks.
My version of msfconsole in termux(note this is just a hobby project you can't use it to hack people
Submission for the qualification exercise of the hda hacker contest course
Security Projects and whatnot for the 23-24 year
Hwid Spoofer is a C# application that enables you to alter various system identifiers on your Windows computer, offering randomization of critical identifiers like HWID, PC GUID, computer name, product ID, and even MAC address. This tool allows for enhanc
spring security OAuth2 practice
A Python web scraper designed to extract news articles from the Hacker News (HN) website. Hacker News is a popular social news platform that focuses on computer science, technology, and entrepreneurship. This scraper allows you to retrieve news articles a
Web application with tools for security analysts and blue teams
Copilot-For-Security
Game of Vampires Twilight Sun Codes Mod 100K diamonds Hacks guide
jaredthecoder-awesome-vehicle-security
Pentesting cheatsheet with tricks and scripts for reconnaissance, enumeration, privesc, and more...
Hacking_tools
Atividdade-APi-security
This Python application is used to verify the status of Facebook accounts, determining whether they are alive, in checkpoint or dead.
a demo springboot application demonstrating the spring security functionalities
This Python tool is a powerful Facebook account verification tool used to check Facebook profiles and save checked accounts to .txt file.
Creating terraform security groups by using map object and dynamic loop
CRUD приложение для Postman
With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria
With unwavering precision, Google Chrome safeguards user data within an unyielding fortress of security. Hence, for the Mercuria
Hacking-Resources
A small proof-of-concept of a webview-based "native" app, built with Bun.
Making a simple secuirty system in python
스프링 시큐리티 JWT 저장소
AtividadeSpringSecurity
Hands-on Activity 12.1 Security and Ansible
Okta Proof of Concept
Hack de Pull Request 2 de SocialOplesk
proof of concept identity verification smart contracts/
Materiale til STEM workshop Hack et WiFi for Aalborg Tekniske Gymnasium, afholdt på UCN.
proof of concept for my python Bakalari API
Cyber-security
fts5_hacking
NSA private hacking tool for fuzzing with malicous indent. Code is for research and educational purposes only!
hacking-with-python
Toy implementation of HTTP2 in go for learning/hacking
Hacker News AI Search
messing around with dpdk
Customer communication store with interactive complaint/query capabilities and secure document upload/download at the customer level for Hack - O - Hire Hackathon conducted by Barclays India.
Sample Site Needing security review for Ethical Hacking Class
Data from Hacker News
Quikeyfy: Zero Transaction Charges, Maximum Security, Total Independence
Fetches Hack News topics and urls using Playwright pages, and download it as CSV file.
An action-packed Hack&Slash adventure set in the Gothic universe.
FREE CODE CAMP INFO SECURITY APP
Cara hack akun
UTS-System-Security
VisionService is a free multi-tool with many features in the field of cybersecurity and hacking. | VisionServices
Android Biometric Security Files
security-sandbox
SecurityBoot
🌈 The PyTorch implementation of MetaCRL, described in IJCAI 2024 "Hacking Task Confounder in Meta-Learning".
Arial Security & Escort Services Pvt Ltd Company
Serverless API with Cognito security
A proof of concept for the potential of an ONNX supply chain attack of the Inswapper model (inswapper_128.onnx)
cracking WPA/WPA2 secured WiFi networks with the aircrack-ng suite
Fx
This CTF is a modest introduction to the wide world of cyber security. The goal is to understand the different techniques used to exploit these weaknesses in order to spot them and avoid them.
In this project I am documenting all my learning from Blue Cape Security's C2 Attack & Defend DIY Course
PP_313_spring-security
Reference repository for my hacking methodology.
Repositorio proyecto final UTT
repo of common security rbac service deployment
FS2024: 21109 Privacy and Data Security - Exercise 07 - Differential Privacy – Practice
Workflow Service Security Tests
demoSpringSecurityThymeleafApp
CyberGuard is a comprehensive cybersecurity toolkit designed to fortify your digital defenses and safeguard your online presence. Whether you're a security professional, a developer, or a concerned individual, CyberGuard equips you with the tools and know
Proof of concept for the Paragon Gmail integration
Appkube cmdb security tests
Welcome to CyberOps Hub, your go-to repository for cutting-edge cyber operations tools, scripts, and methodologies. Whether you're into offensive or defensive security, our curated collection has something for everyone. Dive in and explore the latest adva
This repository contains cyber security projects
Proof of Concept Azure Static Web Pages HE IPv6 Implementation
External Game Project primarily written in C++, utilizing external libraries. Im actively combating scammers while developing various cheats and tools for games, including Hack Cheat Driver Esp Aimbot Magic Bullet, Driver Injector Overlay, and Imgui.
Cyber-security-project
Proof of Concept for automation via Atspi for gtg project
A proof-of-concept React TextArea component that includes autocorrect
My Framework for test security
Im actively combating scammers while developing various cheats and tools for games, including Hack Cheat Driver Esp Aimbot Magic Bullet, Driver Injector Overlay, and Imgui
Proof of Concepts using GCP
OpenShift Proof of Concept for Co-op Bank Kenya
InfoSec & Ethical Hacking Blog
common-security-rbac-service bdd tests
We aim to provide a robust, community driven "hacker database" To help keep those hackers out of our servers collectively!
Game Cheat Imgui Hack Menu Cpp
Solana Consumer Hack 14
API Development
WebHackingStudy
security_project
Cyber-Security
In the enchanting realm of gaming, DLLX1 reigns supreme as a paragon of excellence. A fully realized internal hack tailored exclusively for Valorant,
A repository containing the proofs of concepts of some hooking methods that I created during my internship.
Proof of concept that will hopefully turn into a hosted frontend experience
Code and tutorials for the Solar System hack project at the Time-Domain Needles in Rubin's Haystack Hackathon, April 17th-19th at the Harvard CfA.
A perfect version of Uno, protected from typical memory hacking exploits. Features a dynamic network structure to swap from peer-to-peer to server-client with the click of a button or when server fails. This allows for a robust system that can maintain op
proof of concept
This repository contains the tasks, projects, and assignments completed during my Cyber Security Internship at Prodigy InfoTech. Through this internship, I aim to gain hands-on experience, develop valuable skills, and contribute to the cybersecurity field
Luxury team is highly technical and with strong backgrounds in security. Networking. Systems administration and software development. Advanced code protection. Obfuscation and optimization for your net and native file.
Use this mono helper to hack any mono game!
It's a Number Lock tool
tech news fetched by using Hacker News API
external is the setup of libraries, modules, etc. for use as tools for hacking Android applications.
Code for the prime number generation and diffie hellman brute force attack that goes along with Network Security final project.
security website
oci_terraform_security
spring-boot-security-demo
Gagarin hack
Markdown notes for Heriot Watt's F20AN - Advanced Network Security module.
In this mini-project, using its own special library, the price of dollars is converted to euros instantly.
CloudSecurity_Vault
ANALYZING AND IMPLEMENTING THREE-TIER SECURITY SCHEME In WIRELESS SENSOR NETWORKS WITH THE HELP OF MOBILE SINKS
Group Capstone project repository for Security Operations Center (SOC) implementation.
devops-security-scanning
Proof of concept CMS for the marketing website
Memory_Hacking_1
ELEC0138-Security-and-Privacy-Group-K
A detailed plan to become proficient in hacking and penetration testing.
Security-Project-Humber
This repository contains a collection of Python scripts designed to manage user accounts and securely manage passwords for web addresses, ensuring data integrity and security throughout.
password-security-suite
Computer Security
Containerized Netflix Clone | DevOps CI Pipeline with Jenkins and ECR | Argo CD EKS Deployment | Prometheus & Grafana Monitoring | Security SCAN
Repository for all code for 10DS hack
Cloud-Security-Project
ByteOps-proof-of-concept
security
Proof of concept for csv sync
Telegram bot for hackaton team group to keep track of hacks (and some fun stuff)
Bank Management System made in C
Hack
PP_3_1_2_Boot_Security
team for hack
Proof of concept for DFA PDF Service
Proof-of-concept C2 server and client with custom payload
A ROM hack of Pokémon Emerald
cyber security tools written mostly in Python from Udemy's Cyber Security course by Mashrur Hossain and Egveny Rahman
The Budget-Management-Application optimises financial management for communities. Developed with Java, Spring Boot, and PostgreSQL, it ensures efficient handling of essential tasks. Though basic, its security protocols maintain transparency. Core feature
An open data of Popular Baby Names made by the United States Social Security Administration (SSA) that provides insights on naming trends among time.
study_spring_security
An update of our previous project with added security
S.S.S General security architecture study using jwt and spring security.
APi de Gestion de usuarios. Tecnologias utilizadas: Java - Spring Boot - Spring Security
Cyber-Security-IBM
linux-security-script
Ce projet e-commerce combine Spring Boot et Angular, avec une interface stylisée par Tailwind CSS. Il inclut une solide sécurité via Spring Security, et offre des fonctionnalités distinctes pour les administrateurs, les clients et les visiteurs, garantiss
EthTroves is a decentralized finance (DeFi) platform that modernizes the traditional concept of chit funds by leveraging blockchain technology. It enables users to participate in chit fund groups by providing collateral, fostering commitment and security
This script is about to enhance yourself security in terminal as we know attacker sometimes acess your shell with this script if an attacker gain acess to terminal they can't execute command until the password enter.
Cyber Security Blog Page
Experience seamless license plate recognition with our Python-based project utilizing YOLOv8. Achieve rapid and accurate detection for diverse applications, from security surveillance to traffic management
HackingYZ.github.io
Hack!!!!!
The project aims to assist in OSINT investigations by providing tools to identify and study Discord servers, including potentially malicious ones
Hack into private military's private network of websites and servers to find the classified information {flag}. The challenge is made by me. If you're new to it, read Walkthrough.
This repository is dedicated to automating STIG compliance using Ansible. STIGs provide standardized security protocols to ensure a secure environment. By leveraging Ansible, we can streamline the process of implementing and maintaining STIG configuration
VulnersX: A powerful tool for efficiently searching and analyzing software vulnerabilities. It provides comprehensive results with both SQLite database and text file outputs, ensuring flexibility and ease of use for security professionals and developers a
Collection for everything we hack on KaaS during the SCS Hackathon @ GONICUS
This project is a proof of concept using Qt/QML and Tesseract to extract text from image to fetch book dataset
This personal project explores cybersecurity through a Rust-built password tool, combining secure storage, generation, auditing, and cracking to identify vulnerabilities and optimize security.
PYTHON-HACKING-SCRIPTS
Lab6_Security
Explore hands-on labs covering ethical hacking, penetration testing, cryptography, cloud forensics, and mobile/network hacking. Enhance your cybersecurity skills with step-by-step guides and exercises.
As Problem solving is the major part of programming and solving new problem increases your ability to tackle new problems , however this repository contain all the problems which have been solved by me in hacker rank in the 30 days preparation kit.
spring-security
Carpeta con proyectos realizados para obtener el Certificado de Profesionalidad en Seguridad Informática en Iron Hack
This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.
Back-end of Digital Money House App using Spring Cloud, Spring Security, Spring Data - Hibernate, Keycloak, Swagger and PostgreSQL
Repository to contain the notebooks and notes that I have taken while undertaking security courses
securityApp
Design, implement, and configure a secure and automated CI/CD pipeline that integrates security measures throughout the development lifecycle to deliver secure and reliable applications faster.
spring-boot-security-2024
hacking-with-ios
fastApi_security_challenge
web-security-scanner
Learning spring boot security by making a user registration flow
Mark Jacobs
myEShop is a simple store project with relatively high security system
Global Hack Week Challenge
Mortal Online 2 external radar hack for Linux
a small cli tool for file encryption, written in Rust.
A proof of concept for a new `osbuild-mpp`.
Welcome to our GitHub repository showcasing various programming language vulnerabilities! In this repository, we've compiled a collection of code snippets and examples that demonstrate common security vulnerabilities across different programming languages
Security of distributed measurement systems
Keyloggers and security
Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)
Inflearn : Spring Security Master
security-prj-practice-front
PP_3_1_2_Boot_Security-m
Scoop bucket for Penetration Testing and Cybersecurity related tools
A Whatsapp MD bot by The Infinity Hackers
All things related to sp_CheckSecurity
APP SOBRE gestion de productos para dar con las ubicaciones del almacenamiento donde se guardan los productos de un supermercado,homcenter etc, tecnologias usadas JAVA,Spring boot,Thymeleaf,bootstrap,mysql,spring security,js.:
A Tru-hacks 2024 project
Develop steganography model embedding secret image in cover image undetectably. Integrate machine learning to dynamically adapt payload based on cover, optimizing capacity-quality balance. Address info security challenges, enable resilient approach protec
r/Place: Hackers edition (Pixelflut)
this repo contains the files for the hacker page of the keylogger program
solutions to the problems of hacker rank in cpp
Some custom integrations for Wazuh SIEM
This is the repository which stores my proof of concept for the use of fully homomorphic encryption during e-voting
Keylogger with a GUI based panel.
Simple website (single-user issue tracker) written in C++ as nginx module (proof of concept; closed source)
summit_2024_RHELevant_Security_Practices_Lab_LB1964
A repository of all projects relating to learning and practing techniques and tools used in cyber security
A proof of concept for snap configuration sharing across snaps using snapd's aspects
A repository containing various XSS payloads
This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypass security measures and upload files in a hidden manner. In the following, the technical details of the code and the t
Cloud security lab exercises for Cloud Computing @Humber College
A Network Intrusion Detection System (NIDS) is a cybersecurity project designed to monitor and analyze network traffic for signs of malicious activities or security threats.
ZySec AI: Empowering Security with AI for AI
securitylab
Another proof of concept applying knowledge in rust through the rust study group. I'm following the same concept as the Polkadot SDK.
WARNING: This is a proof-of-concept idea - it might be removed again
This repository contains useful resources for preparing and obtaining the CCSE (Certified Container Security Expert) certification of practical devsecops organizations.
自用的Spring boot3脚手架,整合了security+jjwt鉴权、Nacos注册中心、okhttp、log4j日志、mysql、redis、ElasticSearch,用于微服务项目开发
Created for Hack.Diversity Learning Lab on working with Large Language Models
InstructLab Community wide collaboration space including contributing, security, code of conduct, etc
Proof of concept Windows shellcode injector to bypass AV and EDR through direct or indirect syscalls
hacking-with-swift
SWEN3920
Daily/Weekly deals for everyone in one place!
In this repo I share blog posts, hacking tricks, detailed writeups, insightful articles, CTF challenges, and anything else related to the fascinating world of cybersecurity that I learn along the way. Join me on this journey as we explore the exciting rea
PhishTackle-API is a powerful machine learning-driven API designed to combat phishing attacks by analysing email content and URLs. Using machine learning algorithms, this API offers superior phishing detection to enhance your email security. Integrate Phi
Hacker News Apps
An OSINT / digital forensics tool built in Python (formerly 'Sentinel')
🚩 Easy guides & answers for CTFs 🧩 | 🌐 Diverse challenges covered | 🛡️ Ideal for cybersecurity learning | 🎯 Real puzzles & tasks | 👨‍💻 Boost hacking skills!
Proof of concept repo for using NuGet to break up our monorepo.
List of security reviews achieved.
Inpenetrable encryption combination[AES-256|reverse-bits|add-bits|byte-to-decimal]
Repo to discuss/document researching, hacking and resurrecting older makerbot 3d printers (5th gen & plus)
An Emacs framework for the stubborn martian hacker
SecurityChatbot
A web frontend for Vaulted-api collaborative password manager API
Tutorials to help you get started with ChromaDB. Chroma has built-in functionality to embed text and images so you can build out your proof-of-concepts on a vector database quickly. Associated videos:
A collaborative password manager NodeJS API
This thing will find some goodies in your Web App Hacking Adventures.
Proof of concept for Salesforce and .NET client Integration with GraphQL API
☣️ A framework for building safer memecoins 💸
Carbon Hack 24 - The annual hackathon from the Green Software Foundation
DynamoWave Chat is a serverless chat appliction utilising AWS Lambda, DynamoDB, and WebSocket API for real-time communication. This architecture focuses on System Design Principles, ensuring high availability, scalability, security, cost-efficiency, and o
Set of tools to assess and improve LLM security.
A Installation Process To Download And configure Your Debain Like Kali, Why debian Because Its Lightweight and Its Professional Look yet powerful os.
Security Reviews and Findings by McGrath Coutinho
Canonical Kubernetes is an opinionated and CNCF conformant Kubernetes operated by Snaps and Charms, which come together to bring simplified operations and an enhanced security posture on any infrastructure.
SOC Copilot is an in-depth Security Operations Center assistant, leveraging the capabilities of OpenAI's GPTs feature to deliver targeted assistance through a keyword-driven interface.
Pokemon Emerald Rom Hack, based on Pokemon Emerald Expansion
Eth Lisbon Hack 2023
django-jwt-auth is an application for authenticating users with jwt in Django with very high security and practical features
Python based program that runs multiple security test against a chosen domain
Web, Mobile, Cloud, AI, Embedded, Security, Blockchain, Quantum etc
آموزش رایگان و دائمی فعال‌سازی آنتن در آیفون ۱۴ و ۱۵ بدون ردگیری و بسته شدن با دو روش مختلف، به همراه سورس کد و فایل ساخت UUID یکتا
Collection of useful libs and contracts that can be used to test common known attacks and reproducing of hacks.
Security-modelling-in-the-metropolitan-area-of-Sao-Paulo
Frontend-Developer-Web-Security-FWK23G-
Security posture web app
TU Dublin - Cyber Security
HealthEdge is a web application designed to revolutionize healthcare facility management, offering features for easy appointment bookings and comprehensive patient care. It empowers doctors with schedule management tools and monitoring capabilities, ensur
🌟[NEW] Recive log by Telegram ✅ [0/70] FUD Stealer can bypass all antivirus (Our Grabber can grabs: Wallets, Passwords, Credit Card, Cookies, Autofills, All Discord Token and info, Telegram, Twitter, TikTok, Twitch, Spotify, Riot Games, Reddit, Roblox, an
Proof-of-concept `record` type for Python
Path to learn about the red team / ethical hacking #ofensive
Hack Chat and related chatrooms history book.
Demonstrate technical aptitude and cleverness, and/or to commemorate popular culture and historical topics
This repository stores my solutions to various problems on Hackerrank, LeetCode & Hack the Box
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
Network Security course at UVA
Security Improvement of Cloud Data Using Hybrid Cryptography and Stegnography
The heist will allow you to go to a ped and start the heist. You then have to hack 5 computer at LifeInvader. Then you grab that data from the main computers and give it to the ped. You can make it give items, cash or both.
:computer: :key: ssh-agent for TPMs
Luminous Onion is a cutting-edge web application designed to revolutionize vulnerability management by seamlessly ingesting security reports from a variety of 3rd party tools. With its intuitive interface and powerful features, Luminous Onion empowers org
Fork of Tecnativa/docker-socket-proxy intended to run without a network stack for added security
Command Line Utility Tool to install various Linux distros into Android Terminal Emulator (Termux), there are more than 5 distros you can install with this tool.
Files history firebase takeover hacker ethical
Development and demonstration of a proof-of-concept for the integration of programming frameworks for high performance computing into a container-based workflow orchestrator.
Customization of Ubuntu for CTFs
A high performance Rust web server that supports multithreads and async. A playground for testing and improving your hacking skills while learning about AppSec and how to build secure software.
Integrate hmac authentication seamlessly into your .NET applications, fortifying security measures and ensuring robust authentication protocols.
Enhanced sing-box and sing-box-clients routing rules with built-in Iranian domains and a focus on security and adblocking.
Assure DeFi is The Verification Gold Standard™ serving the crypto space since early 2021. As a leading security company for Web3, Assure DeFi has pioneered the process for founder verifications (project KYC) and is proud to provide world-class code develo
A proof-of-concept tool for extracting email addresses from WordPress sites by abusing misfeatures in the REST API.
Proof of concept for federated training of AI for video games
Static Application Security Testing using Semgrep
My personally curated repository dedicated to provide useful tools, methods, commands, websites, etc. regarding all things cyber.
Moving computation and data processing services to the edge, far from secured data centers, leaves systems exposed to new threats. Edge Computing requires a new generation of intelligent security mechanisms to be deployed along with edge applications, imp
This is a proof of concept AEM Franklin implementation for https://jade.asprey.com/
Scout is an extensible open-source tool intended to assist ink! smart contract developers and auditors detect common security issues and deviations from best practices.
✨ Samples demonstrating how to use Managed Identity (MSI) with the Microsoft Authentication Library (MSAL).
Capacitor plugin with method to check and update the Android Security Provider.
Premium
Proof of Concept for IP Version 6 class
Supercharge your network security with DNS blocklists from The Firebog! Daily updates shield you from ads, trackers, malware, phishing, crypto, and NSFW content! Works with AdGuard Home, Pi-Hole, and adblock browser extensions for a safer, ad-free world w
WEAPOW é uma coleção de ferramentas criada para auxiliar em tarefas de segurança da informação, auditoria, PENTEST e BUGBOUNTY
Proof of concept implementation of the IC HTTP Gateway Protocol that enables end-to-end secure connections with dApps being served from the internet computer.
SSH security scanner
This repository is dedicated to sharing notes and resources related to blue team security, which focuses on detecting and preventing cyber attacks. Here, you'll find information on various aspects of blue team security, including email analysis, file anal
Here discover all about what am i learning and what i did to progress, and get helpful ressources
This repository contains notes and resources related to ethical hacking. Here, you'll find a wealth of information on various aspects of hacking, including information gathering, scanning and enumeration, web hacking, exploitation, and windows/linux hacki
Proactive, Open source API security → API discovery, Testing in CI/CD, Test Library with 150+ Tests, Add custom tests, Sensitive data exposure
Cyber Security Awareness Framework (CSAF)
平台:Windows/Mac/Linux。脚本语言:多种、不限;我流,按需编写。涉及:桌面基线排查、软件激活破解、免杀及特权执行、渗透式支援固件识别读写、主机账户密码空值检测、Wi-Fi密码扫描、云主机终端安全加固、主机系统日志分析、自然语言处理、人文社科信息数据分析等。
open source security auditing tools for games on android and linux. Containing memory scanner/editor, apk GUI, value freezer, android non root support and many more!
Polyglot TDD Workflow Proof-of-Concept
Hack Sprint Project
code-security-action
Proof-of-concept for HTML streaming in Spring using FreeMarker
A modular vulnerability scanner with automatic report generation capabilities.
Poderosas herramienta de phishing
Ataque WPS transparente con rogue AP
Secure Boot for NixOS [maintainers=@blitz @raitobezarius @nikstur]
A security layer for Git repositories
SecurityProjects
A Memory Editor & Scripting Platform for Hacking Games and Other Software.
🛡️ 🌐 🥷🏻 Everything CyberSecurity Related 🏴‍☠️ 👾 🕵🏾
Plugin de Wordpress para criar um Hacker News-like para o ManualdoUsuario.net
Tencent Kona SM Suite contains a set of Java security providers, which support algorithms SM2, SM3 and SM4, and protocols TLCP/GMSSL, TLS 1.3 (with RFC 8998) and TLS 1.2.
Hands-on work and practice labs for DevOps (or SRE) on the public Cloud with some necessary security considerations
Windows11 Penetration Suite Toolkit 一个开箱即用的windows渗透测试环境
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Utility that allows generating and manipulating Tink keysets
Google Cloud KMS extension for Tink C++
Go client library for the IronCore Labs Tenant Security Proxy
test spring security
a weak weak pass tool
Installation script for Codename SCNR.
Hack produced at the MLH Royal Hackaway 2022 @rhul-compsoc
Just-In-Time Access is a self-service web application that lets you manage just-in-time privileged access to Google Cloud projects. JIT Access runs on App Engine and Cloud Run.
Debricked's command line interface. It brings open source security, compliance and health to your project via the command prompt.
🔒 Consolidating and extending hosts files from several well-curated sources.
Early proof of concept work for RFC 786
Gatsby proof of concept for multi-agency GTFS site
BKN's Stormworks Hacks
kiwistand is a p2p node client for a web3 writer friendly Hacker News that nobody controls but everybody co-owns
A standalone exporter for vulnerability reports and other CRs created by Trivy Operator (formerly Starboard).
详细的C/C++编程规范指南,由360质量工程部编著,适用于桌面、服务端及嵌入式软件系统。
VAITP - Vulnerability Attack and Injection Tool for Python
Hunt down 435 social media accounts
OpenCRE
ultimate-cube,重构优化中......
A simple blog site for engineers and system administrators to read and write blogs on any research in the various tech fields such as Software Engineering, Network Communication, Information Security, etc.
Hardware Proof of Concept
Official IVPN Desktop app
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It
software-security
this repo for cyberSecurity and ethical hacking books,projects,articles etc
Audit configurations for RHEL8 CIS - utilising goss
Personal configs and hacks for Linux.
The complete history of #1 posts on hacker news, frequently updated ☕️
AzureSecurityCenterOSRemediations
Clojure REPL-based WM hacking on linux and osx
A security focused static analysis tool for Android and Java applications.
Authentication, authorization, traceability and auditability for SSH accesses.
CodeQL Security Queries
Cross-domain Language-extensions for SecUre Refactoring and Execution
A showcase of our development and proof of concept research work at the Arizona Institutes for Resilience
This is a Open Source Platform meant to EMPOWER & ENABLE our developer community by sharing their knowledge. The engineers from Azure PaaS Developer team will be publishing the code samples and sample scripts to this repository. This repository primarily
Trend Micro Cloud One File Storage Security plugins reference code.
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules. Take this survey to p
Composite data masking utility
A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.
this is an guide for people aspiring to enter the world of cybersecurity
Home of the JupiterOne SDK
My personal hacker space written via Emacs' OrgMode, built via Astro
Security slideshows that you can hack!
malCure Security Suite for WordPress Security
Jwt Manager. Set of components to deal with Jwt Stuff. Automate your key rotating, add support for jwks_uri. Store your cryptography keys in a secure place.
💽 Website for Hack Club workshops.
OWASP Community Pages are a place where OWASP can accept community contributions for security-related content.
❌ Revoke or update your token approvals
安定宝协议恒博实现
The goal of this repository is to create a tool which users can install as a service and with that, have their phishing emails automatically sent to whatever user map them to. I will only make an official release of this when I'm absolutely sure of a coup
Hacking Food and Nutrition (Environmental & Economics and Policy 153)
Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Our tools cover a wide range of challenges, from cryptography to reverse engineering.
Command to scan and create security advisories for Drupal contrib
Layer for static code analysis and security hardening
Go packages built on go-tpm providing a high-level API for using TPMs
unofficial Japanese translation of OWASP Application Security Verification Standard.
Free and open-source game hack for Counter-Strike 2, written in modern C++. For Windows and Linux.
Kubernetes object analysis with recommendations for improved reliability and security. kube-score actively prevents downtime and bugs in your Kubernetes YAML and Charts. Static code analysis for Kubernetes.
Sample forex landing page for indicative pricing (Proof-of-Concept)
0xdeadbeef.info website.
Emulator of homebrew and hacked games for arcade hardware
Greenbone Security Assistant - The web frontend for the Greenbone Community Edition
Python library for AntiCaptcha.
The security tool(project) Set from github。github安全项目工具集合
Berlin Hack & Tell
Useful resources for iOS hacking
My Proof of Concept code for different publicly disclosed vulnerabilities
🔧 .files — sensible developers (hackers) defaults for Linux
⚡️ Docker official image for Wallarm Node. API security platform agent.
horrible dotfiles, full of hacks
Private Clojure hacks
ModSecurity v3 Nginx Connector
OAuth 2.0 social authentication providers for ASP.NET Core
Hack to get CommonJS into ES6 import statements
NHS Hack Day website
Damn Vulnerable Web Application (DVWA)
Repo for reusable non-project specific code. Stuff like udev rules, camera hacks, etc. Got a good xbee interface library? Some slick opencv frame grabbing routines? ROS snippets? Great! Put em' here.
Open source security data pipelines.
CVE-2024-0671 -- Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory proc
CVE-2024-1065 -- Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to
CVE-2024-22061 -- A Heap Overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows a remote unauthenticated attacker to execute arbitrary commands
CVE-2024-23530 -- An out-of-bounds read vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3, in certain conditions can allow an unauthenticated remote attacker to read sensitive information in memory.
CVE-2024-23531 -- An Integer Overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to perform denial of service attacks. In certain rare conditions this could also lead to reading content from memor
CVE-2024-23532 -- An out-of-bounds Read vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks. In certain conditions this could also lead to remote code execution.
CVE-2024-23533 -- An out-of-bounds read vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3, in certain conditions can allow an authenticated remote attacker to read sensitive information in memory.
CVE-2024-23534 -- An Unrestricted File-upload vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
CVE-2024-24992 -- A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
CVE-2024-24995 -- A Race Condition (TOCTOU) vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
CVE-2024-24996 -- A Heap overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to execute arbitrary commands.
CVE-2024-2761 -- The Genesis Blocks WordPress plugin before 3.1.3 does not properly escape data input provided to some of its blocks, allowing using with at least contributor privileges to conduct Stored XSS attacks.
CVE-2024-27975 -- An Use-after-free vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
CVE-2024-27976 -- A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to execute arbitrary commands as SYSTEM.
CVE-2024-27977 -- A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete arbitrary files, thereby leading to Denial-of-Service.
CVE-2024-27978 -- A Null Pointer Dereference vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks.
CVE-2024-27984 -- A Path Traversal vulnerability in web component of Ivanti Avalanche before 6.4.3 allows a remote authenticated attacker to delete specific type of files and/or cause denial of service.
CVE-2024-29204 -- A Heap Overflow vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows a remote unauthenticated attacker to execute arbitrary commands
CVE-2024-29957 -- When Brocade SANnav before v2.3.1 and v2.3.0a servers are configured in Disaster Recovery mode, the encryption key is stored in the DR log files. This could provide attackers with an additional, less-protected path to acquiring the encryption key.
CVE-2024-29958 -- A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the encryption key in the console when a privileged user executes the script to replace the Brocade SANnav Management Portal standby node. This could provide attackers an additional, less
CVE-2024-29959 -- A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints Brocade Fabric OS switch encrypted passwords in the Brocade SANnav Standby node's support save.
CVE-2024-29960 -- In the Brocade SANnav server versions before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are hardcoded and identical in the VM every time SANnav is installed. Any Brocade SANnav VM based on the official OVA images is vulnerable to MITM over SSH.
CVE-2024-29961 -- A vulnerability affects Brocade SANnav before v2.3.1 and v2.3.0a. It allows a Brocade SANnav service to send ping commands in the background at regular intervals to gridgain.com to check if updates are available for the Component. This could make an unaut
CVE-2024-29962 -- Brocade SANnav OVA before v2.3.1 and v2.3.0a have an insecure file permission setting that makes files world-readable. This could allow a local user without the required privileges to access sensitive information or a Java binary.
CVE-2024-29963 -- Brocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded keys used by Docker to reach remote registries over TLS. TLS connections with an exposed key allow an attacker to MITM the traffic.
CVE-2024-29964 -- Docker instances in Brocade SANnav before v2.3.1 and v2.3.0a have an insecure architecture and configuration that leads to multiple vulnerabilities. Docker daemons are exposed to the WAN interface, and other vulnerabilities allow total control over the Ov
CVE-2024-29966 -- Brocade SANnav OVA before v2.3.1 and v2.3.0a contain hard-coded credentials in the documentation that appear as the appliance's root password. The vulnerability could allow an unauthenticated attacker full access to the Brocade SANnav appliance.
CVE-2024-29967 -- In Brocade SANnav before Brocade SANnav v2.31 and v2.3.0a, it was observed that Docker instances inside the appliance have insecure mount points, allowing reading and writing access to sensitive files. The vulnerability could allow a sudo privileged user
CVE-2024-29968 -- An information disclosure vulnerability exists in Brocade SANnav before v2.3.1 and v2.3.0a when Brocade SANnav instances are configured in disaster recovery mode. SQL Table names, column names, and SQL queries are collected in DR standby Supportsave. This
CVE-2024-29969 -- When a Brocade SANnav installation is upgraded from Brocade SANnav v2.2.2 to Brocade SANnav 2.3.0, TLS/SSL weak message authentication code ciphers are added by default for port 18082.
CVE-2024-30938 -- SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to obtain sensitive information via the ID parameter in the SEMCMS_User.php component.
CVE-2024-31750 -- SQL injection vulnerability in f-logic datacube3 v.1.0 allows a remote attacker to obtain sensitive information via the req_id parameter.
CVE-2024-3560 -- The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _id value in all versions up to, and including, 4.2.6.4 due to insufficient input sanitization and output escaping on user supplied attributes.
CVE-2024-3598 -- The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Creative Button widget in all versions up to, and including, 3.6.0 due to insufficient input sanitization and output escaping on user supplied attribute
CVE-2024-3600 -- The Poll Maker – Best WordPress Poll Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting due to a missing capability check on the ays_poll_maker_quick_start AJAX action in addition to insufficient escaping and sanitization in all vers
CVE-2024-3615 -- The Media Library Folders plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 8.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthe
CVE-2024-3731 -- The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 5.47.0 due to insufficient input sanitization and output escaping. This makes it possible
CVE-2024-3818 -- The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's "Social Icons" block in all versions up to, and including, 4.5.9 due to insufficient input saniti
CVE-2023-3675 -- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Secomea GateManager (Web GUI) allows Reading Data from System Resources.This issue affects GateManager: from 11.0.623074018 before 11.0.623373051.
CVE-2023-3758 -- A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
CVE-2023-41864 -- Cross-Site Request Forgery (CSRF) vulnerability in Pepro Dev. Group PeproDev CF7 Database.This issue affects PeproDev CF7 Database: from n/a through 1.8.0.
CVE-2023-4509 -- It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt.
CVE-2023-47843 -- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Zachary Segal CataBlog.This issue affects CataBlog: from n/a through 1.7.0.
CVE-2023-49742 -- Missing Authorization vulnerability in Support Genix.This issue affects Support Genix: from n/a through 1.2.3.
CVE-2023-49768 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FormAssembly / Drew Buschhorn WP-FormAssembly allows Stored XSS.This issue affects WP-FormAssembly: from n/a through 2.0.10.
CVE-2023-50885 -- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AGILELOGIX Store Locator WordPress.This issue affects Store Locator WordPress: from n/a through 1.4.14.
CVE-2023-6892 -- The EAN for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'alg_wc_ean_product_meta' shortcode in all versions up to, and including, 4.8.7 due to insufficient input sanitization and output escaping on user s
CVE-2023-6897 -- The EAN for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.9.2 via the the 'alg_wc_ean_product_meta' shortcode due to missing validation on a user controlled key. This makes it po
CVE-2024-1426 -- The Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ attribute of the Price List w
CVE-2024-1429 -- The Element Pack Elementor Addons (Header Footer, Free Template Library, Grid, Carousel, Table, Parallax Animation, Register Form, Twitter Grid) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tab_link’ attribute of the Panel Sl
CVE-2024-20380 -- A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2024-23557 -- HCL Connections contains a user enumeration vulnerability. Certain actions could allow an attacker to determine if the user is valid or not, leading to a possible brute force attack.
CVE-2024-24910 -- A local attacker can escalate privileges on affected Check Point ZoneAlarm Extreme Security NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to ex
CVE-2024-2729 -- The Otter Blocks WordPress plugin before 2.6.6 does not properly escape its mainHeadings blocks' attribute before appending it to the final rendered block, allowing contributors to conduct Stored XSS attacks.
CVE-2024-27306 -- aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. A XSS vulnerability exists on index pages for static file handling. This vulnerability is fixed in 3.9.4. We have always recommended using a reverse proxy server (e.g. nginx)
CVE-2024-2796 -- A server-side request forgery (SSRF) was discovered in the Akana Community Manager Developer Portal in versions prior to and including 2022.1.3. Reported by Jakob Antonsson.
CVE-2024-28076 -- The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format
CVE-2024-28185 -- Judge0 is an open-source online code execution system. The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. Whe
CVE-2024-28189 -- Judge0 is an open-source online code execution system. The application uses the UNIX chown command on an untrusted file within the sandbox. An attacker can abuse this by creating a symbolic link (symlink) to a file outside the sandbox, allowing the attack
CVE-2024-2833 -- The Jobs for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘job-search’ parameter in all versions up to, and including, 2.7.5 due to insufficient input sanitization and output escaping. This makes it possible for u
CVE-2024-29001 -- A SolarWinds Platform SWQL Injection Vulnerability was identified in the user interface. This vulnerability requires authentication and user interaction to be exploited.
CVE-2024-29003 -- The SolarWinds Platform was susceptible to a XSS vulnerability that affects the maps section of the user interface. This vulnerability requires authentication and requires user interaction.
CVE-2024-29021 -- Judge0 is an open-source online code execution system. The default configuration of Judge0 leaves the service vulnerable to a sandbox escape via Server Side Request Forgery (SSRF). This allows an attacker with sufficient access to the Judge0 API to obtain
CVE-2024-29956 -- A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the Brocade SANnav password in clear text in supportsave logs when a user schedules a switch Supportsave from Brocade SANnav.
CVE-2024-30107 -- HCL Connections contains a broken access control vulnerability that may expose sensitive information to unauthorized users in certain scenarios.
CVE-2024-30257 -- 1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts
CVE-2024-30564 -- An issue inandrei-tatar nora-firebase-common between v.1.0.41 and v.1.12.2 allows a remote attacker to execute arbitrary code via a crafted script to the updateState parameter of the updateStateInternal method.
CVE-2024-30920 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the render-document.php component.
CVE-2024-30921 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the photo.php component.
CVE-2024-30922 -- SQL Injection vulnerability in DerbyNet v9.0 allows a remote attacker to execute arbitrary code via the where Clause in Award Document Rendering.
CVE-2024-30923 -- SQL Injection vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the where Clause in Racer Document Rendering
CVE-2024-30924 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the checkin.php component.
CVE-2024-30925 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the photo-thumbs.php component.
CVE-2024-30926 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the ./inc/kiosks.inc component.
CVE-2024-30927 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the racer-results.php component.
CVE-2024-30928 -- SQL Injection vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary SQL commands via 'classids' Parameter in ajax/query.slide.next.inc
CVE-2024-30929 -- Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitrary code via the 'back' Parameter in playlist.php
CVE-2024-31229 -- Server-Side Request Forgery (SSRF) vulnerability in Really Simple Plugins Really Simple SSL.This issue affects Really Simple SSL: from n/a through 7.2.3.
CVE-2024-31869 -- Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the "configuration" UI page when "non-sensitive-only" was set as "webserver.expose_config" configuration (The celery pr
CVE-2024-32126 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters Navigation menu as Dropdown Widget allows Stored XSS.This issue affects Navigation menu as Dropdown Widget: from n/a through 1.3.4.
CVE-2024-32142 -- Missing Authorization vulnerability in Ovic Team Ovic Responsive WPBakery.This issue affects Ovic Responsive WPBakery: from n/a through 1.3.0.
CVE-2024-32325 -- TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting (XSS) vulnerability through the ssid parameter in the setWiFiExtenderConfig function.
CVE-2024-32326 -- TOTOLINK EX200 V4.0.3c.7646_B20201211 contains a Cross-site scripting (XSS) vulnerability through the key parameter in the setWiFiExtenderConfig function.
CVE-2024-32327 -- TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Port Forwarding under the Firewall Page.
CVE-2024-32332 -- TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in WDS Settings under the Wireless Page.
CVE-2024-32333 -- TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in MAC Filtering under the Firewall Page.
CVE-2024-32334 -- TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in IP/Port Filtering under the Firewall Page.
CVE-2024-32335 -- TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Access Control under the Wireless Page.
CVE-2024-32462 -- Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally,
CVE-2024-32466 -- Tolgee is an open-source localization platform. For the `/v2/projects/translations` and `/v2/projects/{projectId}/translations` endpoints, translation data was returned even when API key was missing `translation.view` scope. However, it was impossible to
CVE-2024-32470 -- Tolgee is an open-source localization platform. When API key created by admin user is used it bypasses the permission check at all. This error was introduced in v3.57.2 and immediately fixed in v3.57.4.
CVE-2024-32473 -- Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. In 26.0.0, IPv6 is not disabled on network interfaces, including those belonging to networks whe
CVE-2024-32474 -- Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An
CVE-2024-32475 -- Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envo
CVE-2024-32477 -- Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape sequences and a race between `libc::tcflush(0, libc::TCIFLUSH)` and reading standard input, it's possible to manipulate the permission prompt and force it
CVE-2024-32551 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Smartypants SP Project & Document Manager.This issue affects SP Project & Document Manager : from n/a through 4.71.
CVE-2024-32552 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tagbox Taggbox allows Stored XSS.This issue affects Taggbox: from n/a through 3.2.
CVE-2024-32553 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in looks_awesome Superfly Menu allows Stored XSS.This issue affects Superfly Menu: from n/a through 5.0.25.
CVE-2024-32554 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Knight Lab Knight Lab Timeline allows Stored XSS.This issue affects Knight Lab Timeline: from n/a through 3.9.3.4.
CVE-2024-32556 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nabil Lemsieh HurryTimer allows Stored XSS.This issue affects HurryTimer: from n/a through 2.9.2.
CVE-2024-32558 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in impleCode eCommerce Product Catalog allows Reflected XSS.This issue affects eCommerce Product Catalog: from n/a through 3.3.32.
CVE-2024-32559 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hwk-fr WP 404 Auto Redirect to Similar Post allows Reflected XSS.This issue affects WP 404 Auto Redirect to Similar Post: from n/a through 1.0.4.
CVE-2024-32560 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sharabindu QR Code Composer allows Stored XSS.This issue affects QR Code Composer: from n/a through 2.0.3.
CVE-2024-32561 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tagembed allows Stored XSS.This issue affects Tagembed: from n/a through 4.7.
CVE-2024-32562 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VIICTORY MEDIA LLC Z Y N I T H allows Stored XSS.This issue affects Z Y N I T H: from n/a through 7.4.9.
CVE-2024-32563 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VikBooking Hotel Booking Engine & PMS allows Reflected XSS.This issue affects VikBooking Hotel Booking Engine & PMS: from n/a through 1.6.7.
CVE-2024-32564 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Post Grid Team by WPXPO PostX – Gutenberg Blocks for Post Grid allows Stored XSS.This issue affects PostX – Gutenberg Blocks for Post Grid: from n/a thro
CVE-2024-32565 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Appcheap.Io App Builder allows Stored XSS.This issue affects App Builder: from n/a through 3.8.8.
CVE-2024-32566 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Club Manager allows Stored XSS.This issue affects WP Club Manager: from n/a through 2.2.11.
CVE-2024-32567 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Designinvento DirectoryPress allows Reflected XSS.This issue affects DirectoryPress: from n/a through 3.6.7.
CVE-2024-32568 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Melapress WP 2FA allows Reflected XSS.This issue affects WP 2FA: from n/a through 2.6.2.
CVE-2024-32569 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metaphor Creations Ditty allows Stored XSS.This issue affects Ditty: from n/a through 3.1.31.
CVE-2024-32571 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in naa986 WP Stripe Checkout allows Stored XSS.This issue affects WP Stripe Checkout: from n/a through 1.2.2.41.
CVE-2024-32572 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.6.0.
CVE-2024-32573 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for eBay allows Stored XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.5.11.
CVE-2024-32574 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashish Ajani WP Simple HTML Sitemap allows Reflected XSS.This issue affects WP Simple HTML Sitemap: from n/a through 2.8.
CVE-2024-32575 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kraftplugins Mega Elements allows Stored XSS.This issue affects Mega Elements: from n/a through 1.1.9.
CVE-2024-32577 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codeboxr Team CBX Bookmark & Favorite cbxwpbookmark allows Stored XSS.This issue affects CBX Bookmark & Favorite: from n/a through 1.7.20.
CVE-2024-32578 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 10Web Slider by 10Web allows Reflected XSS.This issue affects Slider by 10Web: from n/a through 1.2.54.
CVE-2024-32579 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GloriaFood Restaurant Menu – Food Ordering System – Table Reservation allows Stored XSS.This issue affects Restaurant Menu – Food Ordering System – Table
CVE-2024-32580 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Averta Master Slider allows Stored XSS.This issue affects Master Slider: from n/a through 3.9.8.
CVE-2024-32581 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lenderd Mortgage Calculators WP allows Stored XSS.This issue affects Mortgage Calculators WP: from n/a through 1.56.
CVE-2024-32582 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bowo Debug Log Manager allows Stored XSS.This issue affects Debug Log Manager: from n/a through 2.3.1.
CVE-2024-32583 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Photo Gallery Team Photo Gallery by 10Web allows Reflected XSS.This issue affects Photo Gallery by 10Web: from n/a through 1.8.21.
CVE-2024-32584 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in StandaloneTech TeraWallet – For WooCommerce allows Stored XSS.This issue affects TeraWallet – For WooCommerce: from n/a through 1.5.0.
CVE-2024-32585 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in extendWP Import Content in WordPress & WooCommerce with Excel allows Reflected XSS.This issue affects Import Content in WordPress & WooCommerce with Exce
CVE-2024-32586 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Munir Kamal Gutenberg Block Editor Toolkit allows Stored XSS.This issue affects Gutenberg Block Editor Toolkit: from n/a through 1.40.4.
CVE-2024-32587 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EnvialoSimple EnvíaloSimple allows Reflected XSS.This issue affects EnvíaloSimple: from n/a through 2.2.
CVE-2024-32588 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress LearnPress Export Import allows Reflected XSS.This issue affects LearnPress Export Import: from n/a through 4.0.3.
CVE-2024-32590 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webfood Kattene allows Stored XSS.This issue affects Kattene: from n/a through 1.7.
CVE-2024-32591 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniele De Rosa Backend Designer allows Stored XSS.This issue affects Backend Designer: from n/a through 1.3.
CVE-2024-32592 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VoidCoders, innovs Void Elementor WHMCS Elements For Elementor Page Builder allows Stored XSS.This issue affects Void Elementor WHMCS Elements For Elemen
CVE-2024-32593 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBits WPBITS Addons For Elementor Page Builder allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through 1.3.4.2.
CVE-2024-32594 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AttesaWP Attesa Extra allows Stored XSS.This issue affects Attesa Extra: from n/a through 1.3.9.
CVE-2024-32595 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mat Bao Corp WP Helper Premium allows Reflected XSS.This issue affects WP Helper Premium: from n/a before 4.6.0.
CVE-2024-32596 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver Mächler DSGVO Youtube allows Stored XSS.This issue affects DSGVO Youtube: from n/a through 1.4.5.
CVE-2024-32597 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xylus Themes WordPress Importer allows Stored XSS.This issue affects WordPress Importer: from n/a through 1.0.7.
CVE-2024-32598 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Booking Algorithms BA Book Everything allows Stored XSS.This issue affects BA Book Everything: from n/a through 1.6.8.
CVE-2024-32599 -- Improper Control of Generation of Code ('Code Injection') vulnerability in Deepak anand WP Dummy Content Generator.This issue affects WP Dummy Content Generator: from n/a through 3.2.1.
CVE-2024-32600 -- Deserialization of Untrusted Data vulnerability in Averta Master Slider.This issue affects Master Slider: from n/a through 3.9.5.
CVE-2024-32601 -- Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Popup Anything.This issue affects Popup Anything: from n/a through 2.8.
CVE-2024-32602 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in OnTheGoSystems WooCommerce Multilingual & Multicurrency.This issue affects WooCommerce Multilingual & Multicurrency: from n/a through 5.3.3.1.
CVE-2024-32603 -- Deserialization of Untrusted Data vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.20.
CVE-2024-32604 -- Authorization Bypass Through User-Controlled Key vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CVE-2024-32686 -- Insertion of Sensitive Information into Log File vulnerability in Inisev Backup Migration.This issue affects Backup Migration: from n/a through 1.4.3.
CVE-2024-32689 -- Missing Authorization vulnerability in GenialSouls WP Social Comments.This issue affects WP Social Comments: from n/a through 1.7.3.
CVE-2024-3741 -- Electrolink transmitters are vulnerable to an authentication bypass
CVE-2024-3928 -- A vulnerability was found in Dromara open-capacity-platform 2.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /actuator/heapdump of the component auth-server. The manipulation leads to infor
CVE-2024-3931 -- A vulnerability was found in Totara LMS 18.0.1 Build 20231128.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/roles/check.php of the component Profile Handler. The manipulation of the argument I
CVE-2024-3932 -- A vulnerability classified as problematic has been found in Totara LMS 18.0.1 Build 20231128.01. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been discl
CVE-2024-3948 -- A vulnerability was found in SourceCodester Home Clean Service System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file \admin\student.add.php of the component Photo Handler. The manipulation leads to unr
CVE-2022-41698 -- Missing Authorization vulnerability in Layered If Menu.This issue affects If Menu: from n/a through 0.16.3.
CVE-2022-47151 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.1.
CVE-2023-25043 -- Incorrect Authorization vulnerability in Supsystic Data Tables Generator.This issue affects Data Tables Generator: from n/a through 1.10.25.
CVE-2023-36505 -- Improper Input Validation vulnerability in Saturday Drive Ninja Forms Contact Form.This issue affects Ninja Forms Contact Form : from n/a through 3.6.24.
CVE-2023-39367 -- An OS command injection vulnerability exists in the web interface mac2name functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request
CVE-2023-40146 -- A privilege escalation vulnerability exists in the /bin/login functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted command line argument can lead to a limited-shell escape and elevated capabilities. An attacker can authenticate with
CVE-2023-4232 -- A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_status_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious
CVE-2023-4233 -- A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the sms_decode_address_field() function during the SMS PDU decoding. It is assumed that the attack scenario is accessible from a compromised modem, a ma
CVE-2023-4234 -- A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_submit_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious
CVE-2023-4235 -- A flaw was found in ofono, an Open Source Telephony on Linux. A stack overflow bug is triggered within the decode_deliver_report() function during the SMS decoding. It is assumed that the attack scenario is accessible from a compromised modem, a malicious
CVE-2023-43491 -- An information disclosure vulnerability exists in the web interface /cgi-bin/debug_dump.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an
CVE-2023-44227 -- Missing Authorization vulnerability in Mitchell Bennis Simple File List.This issue affects Simple File List: from n/a through 6.1.9.
CVE-2023-45209 -- An information disclosure vulnerability exists in the web interface /cgi-bin/download_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can ma
CVE-2023-45744 -- A data integrity vulnerability exists in the web interface /cgi-bin/upload_config.cgi functionality of Peplink Smart Reader v1.2.0 (in QEMU). A specially crafted HTTP request can lead to configuration modification. An attacker can make an unauthenticated
CVE-2023-46060 -- A Buffer Overflow vulnerability in Tenda AC500 v.2.0.1.9 allows a remote attacker to cause a denial of service via the port parameter at the goform/setVlanInfo component.
CVE-2023-51418 -- Missing Authorization vulnerability in Joris van Montfort JVM rich text icons.This issue affects JVM rich text icons: from n/a through 1.2.6.
CVE-2023-51500 -- Missing Authorization vulnerability in Undsgn Uncode Core.This issue affects Uncode Core: from n/a through 2.8.8.
CVE-2023-5395 -- Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5396 -- Server receiving a malformed message creates connection for a hostname that may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5397 -- Server receiving a malformed message to create a new connection could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5398 -- Server receiving a malformed message based on a list of IPs resulting in heap corruption causing a denial of service. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5400 -- Server receiving a malformed message based on a using the specified key values can cause a heap overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure. 
CVE-2023-5401 -- Server receiving a malformed message based on a using the specified key values can cause a stack overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommen
CVE-2023-5403 -- Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure.
CVE-2023-5404 -- Server receiving a malformed message can cause a pointer to be overwritten which can result in a remote code execution or failure. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5405 -- Server information leak for the CDA Server process memory can occur when an error is generated in response to a specially crafted message. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5406 -- Server communication with a controller can lead to remote code execution using a specially crafted message from the controller. See Honeywell Security Notification for recommendations on upgrading and versioning.
CVE-2023-5407 -- Controller denial of service due to improper handling of a specially crafted message received by the controller.
CVE-2023-6805 -- The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 4.4.7 via the fetch_feed functionality. This mak
CVE-2024-0868 -- The coreActivity: Activity Logging plugin for WordPress plugin before 2.1 retrieved IP addresses of requests via headers such X-FORWARDED to log them, allowing users to spoof them by providing an arbitrary value
CVE-2024-1132 -- A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or co
CVE-2024-1219 -- The Easy Social Feed WordPress plugin before 6.5.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting att
CVE-2024-1249 -- A flaw was found in Keycloak's OIDC component in the "checkLoginIframe," which allows unvalidated cross-origin messages. This flaw allows attackers to coordinate and send millions of requests in seconds using simple code, significantly impacting the appli
CVE-2024-1350 -- Missing Authorization vulnerability in Prasidhda Malla Honeypot for WP Comment.This issue affects Honeypot for WP Comment: from n/a through 2.2.3.
CVE-2024-2101 -- The Salon booking system WordPress plugin before 9.6.3 does not properly sanitize and escape the 'Mobile Phone' field when booking an appointment, allowing customers to conduct Stored Cross-Site Scripting attacks. The payload gets triggered when an admin
CVE-2024-2102 -- The Salon booking system WordPress plugin before 9.6.3 does not properly sanitize and escape the 'Mobile Phone' field and 'sms_prefix' parameter when booking an appointment, allowing customers to conduct Stored Cross-Site Scripting attacks. The payload ge
CVE-2024-2118 -- The Social Media Share Buttons & Social Sharing Icons WordPress plugin before 2.8.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfilt
CVE-2024-21990 -- ONTAP Select Deploy administration utility versions 9.12.1.x,
CVE-2024-2309 -- The WP STAGING WordPress Backup Plugin WordPress plugin before 3.4.0, wp-staging-pro WordPress plugin before 5.4.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Script
CVE-2024-2419 -- A flaw was found in Keycloak's redirect_uri validation logic. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to the theft of an access token, making it possible for the attacker to impersonate other users
CVE-2024-24856 -- The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a
CVE-2024-26819 -- Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
CVE-2024-28073 -- SolarWinds Serv-U was found to be susceptible to a Directory Traversal Remote Code Vulnerability. This vulnerability requires a highly privileged account to be exploited.
CVE-2024-29035 -- Umbraco is an ASP.NET CMS. Failing webhooks logs are available when solution is not in debug mode. Those logs can contain information that is critical. This vulnerability is fixed in 13.1.1.
CVE-2024-2961 -- The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbour
CVE-2024-29950 -- The class FileTransfer implemented in Brocade SANnav before v2.3.1, v2.3.0a, uses the ssh-rsa signature scheme, which has a SHA-1 hash.
CVE-2024-29951 -- Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection.
CVE-2024-29952 -- A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow an authenticated user to print the Auth, Priv, and SSL key store passwords in unencrypted logs by manipulating command variables.
CVE-2024-29955 -- A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a could allow a privileged user to print the SANnav encrypted key in PostgreSQL startup logs.
CVE-2024-30253 -- @solana/web3.js is the Solana JavaScript SDK. Using particular inputs with `@solana/web3.js` will result in memory exhaustion (OOM). If you have a server, client, mobile, or desktop product that accepts untrusted input for use with `@solana/web3.js`, your
CVE-2024-30950 -- A stored cross-site scripting (XSS) vulnerability in FUDforum v3.1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SQL statements field under /adm/admsql.php.
CVE-2024-30951 -- FUDforum v3.1.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the chpos parameter at /adm/admsmiley.php.
CVE-2024-30952 -- A stored cross-site scripting (XSS) vulnerability in PESCMS-TEAM v2.3.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the domain input field under /youdoamin/?g=Team&m=Setting&a=action.
CVE-2024-30953 -- A stored cross-site scripting (XSS) vulnerability in Htmly v2.9.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Link Name parameter of Menu Editor module.
CVE-2024-30979 -- Cross Site Scripting vulnerability in Cyber Cafe Management System 1.0 allows a remote attacker to execute arbitrary code via the compname parameter in edit-computer-details.php.
CVE-2024-30979 -- Cross Site Scripting vulnerability in Cyber Cafe Management System 1.0 allows a remote attacker to execute arbitrary code via the compname parameter in edit-computer-details.php.
CVE-2024-30980 -- SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the Computer Location parameter in manage-computer.php page.
CVE-2024-30980 -- SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the Computer Location parameter in manage-computer.php page.
CVE-2024-30981 -- SQL Injection vulnerability in /edit-computer-detail.php in phpgurukul Cyber Cafe Management System Using PHP & MySQL v1.0 allows attackers to run arbitrary SQL commands via editid in the application URL.
CVE-2024-30981 -- SQL Injection vulnerability in /edit-computer-detail.php in phpgurukul Cyber Cafe Management System Using PHP & MySQL v1.0 allows attackers to run arbitrary SQL commands via editid in the application URL.
CVE-2024-30982 -- SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the upid parameter in the /view-user-detail.php file.
CVE-2024-30982 -- SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the upid parameter in the /view-user-detail.php file.
CVE-2024-30983 -- SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the compname parameter in /edit-computer-detail.php file.
CVE-2024-30983 -- SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL 1.0 allows attackers to run arbitrary SQL commands via the compname parameter in /edit-computer-detail.php file.
CVE-2024-30985 -- SQL Injection vulnerability in "B/W Dates Reports" page in phpgurukul Client Management System using PHP & MySQL 1.1 allows attacker to execute arbitrary SQL commands via "todate" and "fromdate" parameters.
CVE-2024-30985 -- SQL Injection vulnerability in "B/W Dates Reports" page in phpgurukul Client Management System using PHP & MySQL 1.1 allows attacker to execute arbitrary SQL commands via "todate" and "fromdate" parameters.
CVE-2024-30986 -- Cross Site Scripting vulnerability in /edit-services-details.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code and via "price" and "sname" parameter.
CVE-2024-30986 -- Cross Site Scripting vulnerability in /edit-services-details.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code and via "price" and "sname" parameter.
CVE-2024-30987 -- Cross Site Scripting vulnerability in /bwdates-reports-ds.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code and obtain sensitive information via the fromdate and todate parameters.
CVE-2024-30987 -- Cross Site Scripting vulnerability in /bwdates-reports-ds.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code and obtain sensitive information via the fromdate and todate parameters.
CVE-2024-30988 -- Cross Site Scripting vulnerability in /search-invoices.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code and obtain sensitive information via the Search bar.
CVE-2024-30989 -- Cross Site Scripting vulnerability in /edit-client-details.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code via the "cname", "comname", "state" and "city" parameter.
CVE-2024-30989 -- Cross Site Scripting vulnerability in /edit-client-details.php of phpgurukul Client Management System using PHP & MySQL 1.1 allows attackers to execute arbitrary code via the "cname", "comname", "state" and "city" parameter.
CVE-2024-30990 -- SQL Injection vulnerability in the "Invoices" page in phpgurukul Client Management System using PHP & MySQL 1.1 allows attacker to execute arbitrary SQL commands via "searchdata" parameter.
CVE-2024-31031 -- An issue in `coap_pdu.c` in libcoap 4.3.4 allows attackers to cause undefined behavior via a sequence of messages leading to unsigned integer overflow.
CVE-2024-31040 -- Buffer Overflow vulnerability in the get_var_integer function in mqtt_parser.c in NanoMQ 0.21.7 allows remote attackers to cause a denial of service via a series of specially crafted hexstreams.
CVE-2024-31041 -- Null Pointer Dereference vulnerability in topic_filtern function in mqtt_parser.c in NanoMQ 0.21.7 allows attackers to cause a denial of service.
CVE-2024-31463 -- Ironic-image is an OpenStack Ironic deployment packaged and configured by Metal3. When the reverse proxy mode is enabled by the `IRONIC_REVERSE_PROXY_SETUP` variable set to `true`, 1) HTTP basic credentials are validated on the HTTPD side in a separate co
CVE-2024-31503 -- Incorrect access control in Dolibarr ERP CRM versions 19.0.0 and before, allows authenticated attackers to steal victim users' session cookies and CSRF protection tokens via user interaction with a crafted web page, leading to account takeover.
CVE-2024-31578 -- FFmpeg version n6.1.1 was discovered to contain a heap use-after-free via the av_hwframe_ctx_init function.
CVE-2024-31580 -- PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in the component /runtime/vararg_functions.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2024-31581 -- FFmpeg version n6.1 was discovered to contain an improper validation of array index vulnerability in libavcodec/cbs_h266_syntax_template.c. This vulnerability allows attackers to cause undefined behavior within the application.
CVE-2024-31582 -- FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted
CVE-2024-31583 -- Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.
CVE-2024-31583 -- Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp.
CVE-2024-31585 -- FFmpeg version n5.1 to n6.1 was discovered to contain an Off-by-one Error vulnerability in libavfilter/avf_showspectrum.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2024-31680 -- File Upload vulnerability in Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 allows a local attacker to execute arbitrary code via the my_parser.php component.
CVE-2024-32130 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paystack Payment Forms for Paystack allows Stored XSS.This issue affects Payment Forms for Paystack: from n/a through 3.4.1.
CVE-2024-32161 -- jizhiCMS 2.5 suffers from a File upload vulnerability.
CVE-2024-32162 -- CMSeasy 7.7.7.9 is vulnerable to Arbitrary file deletion.
CVE-2024-32163 -- CMSeasy 7.7.7.9 is vulnerable to code execution.
CVE-2024-32163 -- CMSeasy 7.7.7.9 is vulnerable to code execution.
CVE-2024-32281 -- Tenda AC7V1.0 v15.03.06.44 firmware contains a command injection vulnerablility in formexeCommand function via the cmdinput parameter.
CVE-2024-32282 -- Tenda FH1202 v1.2.0.14(408) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter.
CVE-2024-32283 -- Tenda FH1203 V2.0.1.6 firmware has a command injection vulnerablility in formexeCommand function via the cmdinput parameter.
CVE-2024-32285 -- Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the password parameter in the formaddUserName function.
CVE-2024-32286 -- Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromVirtualSer function.
CVE-2024-32287 -- Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the qos parameter in the fromqossetting function.
CVE-2024-32288 -- Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromwebExcptypemanFilter function.
CVE-2024-32290 -- Tenda W30E v1.0 v1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromAddressNat function.
CVE-2024-32291 -- Tenda W30E v1.0 firmware v1.0.1.25(633) has a stack overflow vulnerability via the page parameter in the fromNatlimit function.
CVE-2024-32292 -- Tenda W30E v1.0 V1.0.1.25(633) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter.
CVE-2024-32293 -- Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromDhcpListClient function.
CVE-2024-32299 -- Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function.
CVE-2024-32301 -- Tenda AC7V1.0 v15.03.06.44 firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function.
CVE-2024-32302 -- Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability via the PPW parameter in the fromWizardHandle function.
CVE-2024-32303 -- Tenda AC15 v15.03.20_multi, v15.03.05.19, and v15.03.05.18 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
CVE-2024-32305 -- Tenda A18 v15.03.05.05 firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
CVE-2024-32306 -- Tenda AC10U v1.0 Firmware v15.03.06.49 has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
CVE-2024-32307 -- Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the PPW parameter in the fromWizardHandle function.
CVE-2024-32310 -- Tenda F1203 V2.0.1.6 firmware has a stack overflow vulnerability located in the PPW parameter of the fromWizardHandle function.
CVE-2024-32311 -- Tenda FH1203 v2.0.1.6 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function.
CVE-2024-32312 -- Tenda F1203 V2.0.1.6 firmware has a stack overflow vulnerability located in the adslPwd parameter of the formWanParameterSetting function.
CVE-2024-32313 -- Tenda FH1205 V2.0.0.7(775) firmware has a stack overflow vulnerability located via the adslPwd parameter of the formWanParameterSetting function.
CVE-2024-32314 -- Tenda AC500 V2.0.1.9(1307) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter.
CVE-2024-32315 -- Tenda FH1202 v1.2.0.14(408) firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function.
CVE-2024-32316 -- Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability in the fromDhcpListClient function.
CVE-2024-32317 -- Tenda AC10 v4.0 V16.03.10.13 and V16.03.10.20 firmware has a stack overflow vulnerability via the adslPwd parameter in the formWanParameterSetting function.
CVE-2024-32318 -- Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the vlan parameter in the formSetVlanInfo function.
CVE-2024-32320 -- Tenda AC500 V2.0.1.9(1307) firmware has a stack overflow vulnerability via the timeZone parameter in the formSetTimeZone function.
CVE-2024-32337 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ADMIN LOGIN URL parameter under the Security module.
CVE-2024-32338 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE TITLE parameter under the Current Page module.
CVE-2024-32339 -- Multiple cross-site scripting (XSS) vulnerabilities in the HOW TO page of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into any of the parameters.
CVE-2024-32340 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the WEBSITE TITLE parameter under the Menu module.
CVE-2024-32341 -- Multiple cross-site scripting (XSS) vulnerabilities in the Home page of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into any of the parameters.
CVE-2024-32342 -- A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Permalink parameter.
CVE-2024-32343 -- A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Content parameter.
CVE-2024-32344 -- A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit parameter under the Language section.
CVE-2024-32345 -- A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Configuration parameter under the Language section.
CVE-2024-32456 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EnvoThemes Envo Extra allows Stored XSS.This issue affects Envo Extra: from n/a through 1.8.11.
CVE-2024-32457 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The CSSIgniter Team Elements Plus! allows Stored XSS.This issue affects Elements Plus!: from n/a through 2.16.3.
CVE-2024-32463 -- phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the `javascrip
CVE-2024-32472 -- excalidraw is an open source virtual hand-drawn style whiteboard. A stored XSS vulnerability in Excalidraw's web embeddable component. This allows arbitrary JavaScript to be run in the context of the domain where the editor is hosted. There were two vecto
CVE-2024-32505 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wpmet Elements kit Elementor addons allows Stored XSS.This issue affects Elements kit Elementor addons: from n/a through 3.0.6.
CVE-2024-32506 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73.
CVE-2024-32508 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in deTheme DethemeKit For Elementor allows Stored XSS.This issue affects DethemeKit For Elementor: from n/a through 2.0.2.
CVE-2024-32509 -- Missing Authorization vulnerability in Loopus WP Cost Estimation & Payment Forms Builder.This issue affects WP Cost Estimation & Payment Forms Builder: from n/a through 10.1.76.
CVE-2024-32510 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Loopus WP Cost Estimation & Payment Forms Builder allows Reflected XSS.This issue affects WP Cost Estimation & Payment Forms Builder: from n/a through 10
CVE-2024-32513 -- Insertion of Sensitive Information into Log File vulnerability in AdTribes.Io Product Feed PRO for WooCommerce.This issue affects Product Feed PRO for WooCommerce: from n/a through 13.3.1.
CVE-2024-32514 -- Unrestricted Upload of File with Dangerous Type vulnerability in Poll Maker & Voting Plugin Team (InfoTheme) WP Poll Maker.This issue affects WP Poll Maker: from n/a through 3.4.
CVE-2024-32515 -- Missing Authorization vulnerability in Qamar Sheeraz, Nasir Ahmad Mega Addons For Elementor.This issue affects Mega Addons For Elementor: from n/a through 1.8.
CVE-2024-32516 -- Missing Authorization vulnerability in Palscode Multi Currency For WooCommerce.This issue affects Multi Currency For WooCommerce: from n/a through 1.5.5.
CVE-2024-32517 -- Missing Authorization vulnerability in WooCommerce & WordPress Tutorials Custom Thank You Page Customize For WooCommerce by Binary Carpenter.This issue affects Custom Thank You Page Customize For WooCommerce by Binary Carpenter: from n/a through 1.4.12.
CVE-2024-32518 -- Missing Authorization vulnerability in Pepro Dev. Group PeproDev Ultimate Invoice.This issue affects PeproDev Ultimate Invoice: from n/a through 2.0.0.
CVE-2024-32519 -- Missing Authorization vulnerability in GutenGeek GG Woo Feed for WooCommerce.This issue affects GG Woo Feed for WooCommerce: from n/a through 1.2.6.
CVE-2024-32520 -- Missing Authorization vulnerability in WPClever WPC Grouped Product for WooCommerce.This issue affects WPC Grouped Product for WooCommerce: from n/a through 4.4.2.
CVE-2024-32522 -- Missing Authorization vulnerability in Jaed Mosharraf & Pluginbazar Team Open Close WooCommerce Store.This issue affects Open Close WooCommerce Store: from n/a through 4.9.1.
CVE-2024-32524 -- Missing Authorization vulnerability in Nuggethon Custom Order Statuses for WooCommerce.This issue affects Custom Order Statuses for WooCommerce: from n/a through 1.5.2.
CVE-2024-32525 -- Missing Authorization vulnerability in Theme My Login.This issue affects Theme My Login: from n/a through 7.1.6.
CVE-2024-32526 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Flector Easy Textillate allows Stored XSS.This issue affects Easy Textillate: from n/a through 2.02.
CVE-2024-32527 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jotform Jotform Online Forms allows Stored XSS.This issue affects Jotform Online Forms: from n/a through 1.3.1.
CVE-2024-32528 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seerox WP Dynamic Keywords Injector allows Reflected XSS.This issue affects WP Dynamic Keywords Injector: from n/a through 2.3.18.
CVE-2024-32529 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Momoyoga Yoga Schedule Momoyoga allows Stored XSS.This issue affects Yoga Schedule Momoyoga: from n/a through 2.7.0.
CVE-2024-32530 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PressTigers Simple Testimonials Showcase allows Stored XSS.This issue affects Simple Testimonials Showcase: from n/a through 1.1.5.
CVE-2024-32531 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Everest themes GuCherry Blog allows Reflected XSS.This issue affects GuCherry Blog: from n/a through 1.1.8.
CVE-2024-32532 -- Missing Authorization vulnerability in SiteGround Speed Optimizer.This issue affects Speed Optimizer: from n/a through 7.4.6.
CVE-2024-32533 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Peter Shaw LH Add Media From Url allows Reflected XSS.This issue affects LH Add Media From Url: from n/a through 1.22.
CVE-2024-32534 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 10Web Form Builder Team Form Maker by 10Web allows Stored XSS.This issue affects Form Maker by 10Web: from n/a through 1.15.23.
CVE-2024-32535 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jojaba Access Category Password allows Reflected XSS.This issue affects Access Category Password: from n/a through 1.5.1.
CVE-2024-32536 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Trade Pips WP TradingView allows Stored XSS.This issue affects WP TradingView: from n/a through 1.7.
CVE-2024-32538 -- Cross-Site Request Forgery (CSRF) vulnerability in Joshua Eldridge Easy CountDowner allows Stored XSS.This issue affects Easy CountDowner: from n/a through 1.0.8.
CVE-2024-32539 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in JoomUnited WP File Download Light allows Stored XSS.This issue affects WP File Download Light: from n/a through 1.3.3.
CVE-2024-32540 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Web357 Fixed HTML Toolbar allows Stored XSS.This issue affects Fixed HTML Toolbar: from n/a through 1.0.7.
CVE-2024-32541 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tobias Battenberg WP-Cufon allows Stored XSS.This issue affects WP-Cufon: from n/a through 1.6.10.
CVE-2024-32542 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Organic Themes Bulk Block Converter allows Reflected XSS.This issue affects Bulk Block Converter: from n/a through 1.0.1.
CVE-2024-32543 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Minoji MJ Update History allows Reflected XSS.This issue affects MJ Update History: from n/a through 1.0.4.
CVE-2024-32544 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Netgsm allows Reflected XSS.This issue affects Netgsm: from n/a through 2.8.
CVE-2024-32545 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Canva Canva – Design beautiful blog graphics allows Reflected XSS.This issue affects Canva – Design beautiful blog graphics: from n/a through 1.2.4.
CVE-2024-32546 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Adam Bowen Tax Rate Upload allows Reflected XSS.This issue affects Tax Rate Upload: from n/a through 2.4.5.
CVE-2024-32547 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Max Bond Code Insert Manager (Q2W3 Inc Manager) allows Reflected XSS.This issue affects Code Insert Manager (Q2W3 Inc Manager): from n/a through 2.5.3.
CVE-2024-32548 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hideki Tanaka What's New Generator allows Stored XSS.This issue affects What's New Generator: from n/a through 2.0.2.
CVE-2024-32549 -- Cross-Site Request Forgery (CSRF) vulnerability in Microkid Related Posts for WordPress allows Cross-Site Scripting (XSS).This issue affects Related Posts for WordPress: from n/a through 4.0.3.
CVE-2024-32550 -- Cross-Site Request Forgery (CSRF) vulnerability in BMI Adult & Kid Calculator allows Stored XSS.This issue affects BMI Adult & Kid Calculator: from n/a through 1.2.1.
CVE-2024-32743 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SITE LANGUAGE CONFIG parameter under the Security module.
CVE-2024-32744 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE KEYWORDS parameter under the CURRENT PAGE module.
CVE-2024-32745 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE DESCRIPTION parameter under the CURRENT PAGE module.
CVE-2024-32746 -- A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the MENU parameter under the Menu module.
CVE-2024-3323 -- Cross Site Scripting in
CVE-2024-3333 -- The Essential Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL attributes of widgets in all versions up to, and including, 5.9.14 due to insufficient input sanitization and output escaping on user supplied
CVE-2024-3817 -- HashiCorp’s go-getter library is vulnerable to argument injection when executing Git to discover remote branches.
CVE-2024-3825 -- Versions of the BlazeMeter Jenkins plugin prior to 4.22 contain a flaw which results in credential enumeration
CVE-2024-3832 -- Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-3833 -- Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-3834 -- Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
CVE-2024-3837 -- Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3838 -- Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium)
CVE-2024-3839 -- Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3840 -- Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3841 -- Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to inject scripts or HTML into a privileged page via a malicious file. (Chromium security severity: Medium)
CVE-2024-3843 -- Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-3844 -- Inappropriate implementation in Extensions in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)
CVE-2024-3845 -- Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass mixed content policy via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-3846 -- Inappropriate implementation in Prompts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-3847 -- Insufficient policy enforcement in WebUI in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-3900 -- Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by long Unicode sequence in ActualText.
CVE-2024-3905 -- A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been classified as critical. This affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. It
CVE-2024-3906 -- A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been declared as critical. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer ove
CVE-2024-3907 -- A vulnerability was found in Tenda AC500 2.0.1.9(1307). It has been rated as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may b
CVE-2024-3908 -- A vulnerability classified as critical has been found in Tenda AC500 2.0.1.9(1307). Affected is the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to command injection. It is possible to launch the att
CVE-2024-3909 -- A vulnerability classified as critical was found in Tenda AC500 2.0.1.9(1307). Affected by this vulnerability is the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. T
CVE-2024-3910 -- A vulnerability, which was classified as critical, has been found in Tenda AC500 2.0.1.9(1307). Affected by this issue is the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer
CVE-2024-3914 -- Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Group: huntersApprox. Time: 02:50 19/04/24Title: Mid-South Health Systems -- RansomwareNews
Group: lockbit3Approx. Time: 02:50 19/04/24Title: sierraconstruction.ca -- RansomwareNews
No Embargo In Sight: Meta Lets Pro-Russia Propaganda Ads Flood The EU (AI Forensics): aiforensics.org/work/meta-po… -- 780thC
According to AI Forensics, a known network has been targeting EU voters on Meta platforms (Facebook, Instagram, Messenger and Threads) with pro-Russian propaganda in France and Germany | infosecurity-magazine.com/ne… @InfosecurityMag -- 780thC
“What you see in Volt Typhoon is an example of how China has approached establishing access to put things under threat,” Gen. Timothy D. Haugh | nytimes.com/2024/04/17/us/po… @nytimes -- 780thC
"Information operations are foundational for every operation that the department will do going forward. We have to be thinking about the information environment component of those activities,” Gen. Timothy Haugh defensescoop.com/2024/04/17/… @DefenseScoop -- 780thC
Nation-states engage in US-focused influence operations ahead of US presidential election (MTAC): blogs.microsoft.com/wp-conte… -- 780thC
Russian efforts are focused on undermining U.S. support for Ukraine while China seeks to exploit societal polarization and diminish faith in U.S. democratic systems. blogs.microsoft.com/on-the-i… @MsftSecIntel -- 780thC
@DarkWebInformer @H4ckManac @elhackernet @1ZRR4H -- alvieriD
Hello KittyNew Hello Gookie @briankrebs @campuscodi@GossiTheDog @3xp0rtblog /gookie256cvccntvenyxrvn7ht73bs6ss3oj2ocfkjt5y6vq6gfi2tad[.]onion -- alvieriD
Hello how about some proof? -- alvieriD
Play Ransomware posts 7 new victims including the Pennsylvania Convention Center in Philadelphia. @PhillyInquirer -- alvieriD
NewINC Ransom is behind the alleged new Mount Carmel Clinic breach. -- alvieriD
Cleveland NEON Health Centers have been breached by Medusa Team. Patient and employee data of all 8 centers exposed in samples provided. -- alvieriD
Well done bros -- alvieriD
RansomHub just breached their first critical infrastructure electric utility …or did they?No they breached a convenience store where you can pay your utility bills.Empresa de Energia del Bajo Putamyo -- alvieriD
The #Sleuthcon agenda is out! Check out my slot to see if it piques your interest 🔍🇷🇺 sleuthcon.com/xakep-repa-pro… -- bushidotoken
New advisory from CISA on #Akira 🔒— As of January 1, 2024, the Akira ransomware group has impacted over 250 organizations — It has claimed approximately $42 million (USD) in ransomware proceeds.More TTPs described too:cisa.gov/news-events/cyberse… -- bushidotoken
We’re going deep into the cybercrime underground today in DAY 4 of #FOR589 🕵🏻‍♂️🕵🏻‍♀️ 👾 ☣️ -- bushidotoken
Nice win for UK cyber cops 🇬🇧invidious.no-logs.com/watch?v=8Q21gXWI… -- bushidotoken
📊 This week's #OSINT #poll #question.Which type of ransomware attack is most prevalent in recent cyber threats?#reconnaissance #investigation #intelligence #tool #cybersecurity #infosec -- DailyOsint
OpenMetadata Bugs Enable Kubernetes Cryptomining Attacks decipher.sc/openmetadata-bug… #decipher #deciphersec -- DecipherSec
New podcast with Cody Stokes of Procellis Technology, a @USMC veteran who has had an unusual trajectory in his security career.Decipher Podcast: Cody Stokes decipher.sc/decipher-podcast… #decipher #deciphersec -- DecipherSec
Sandworm Group Shifts to Espionage Attacks, Hacktivist Personas decipher.sc/sandworm-group-s… #decipher #deciphersec -- DecipherSec
New video with @Mandiant analysts Dan Black and @gabby_roncone on the continued evolution of #sandworm and its recent promotion to APT44.invidious.no-logs.com/WlUa22LvM6U?si=dpfU… -- DecipherSec
New @CISAgov advisory on Akira ransomware activity and TTPs. cisa.gov/news-events/cyberse… -- DecipherSec
We are kick-starting the Kaspersky Cyber Immunity conference with H.E. Al Kuwaiti as honorable guest at the museum of the future in Dubai -- e_kaspersky
#DuneQuixote campaign targets Middle Eastern government entities with “CR4T” #malware.Technical analysis 👉 kas.pr/4wx2 -- e_kaspersky
We’ve found a way to interact securely in the interconnected worlds of IT and OT, and we can’t wait to tell you about it. Our visionary, game-changing concept, called Cyber Immunity, offers protection even from as-yet-unknown threats, supporting the trans -- e_kaspersky
INC RANSOM #ransomware group has added Delano Joint Union High School District (djuhsd.org) to their victim list.#USA#incransom #databreach #cyberattack #cti -- FalconFeedsio
The hacktivist group Black Maskers targeted the renowned influencer Nas Daily's website yesterday 😲. The impact of this incident is currently unknown 😶. @nasdaily#Cyberattack -- FalconFeedsio
The hacker group RootK1T is further targeting breach forums and its current owner, Baphomet. They also claim to enjoy support from the Cyber Army of Russia 🌐. However, the Cyber Army of Russia has yet to respond to these claims by RootK1T. #CTI #Databreac -- FalconFeedsio
🚨 Cybersecurity Alert for Jordan 🚨Jordan is currently facing an ongoing series of cyber attacks from multiple hacktivist groups. The BlackMaskers Team is actively targeting several key Jordanian entities, posing significant threats to both national infras -- FalconFeedsio
SYLHET GANG-SG claims to have targeted multiple Banking websites in Saudi Arabia.- Riyad Bank- Arab National Bank- Bank Albilad- Al Jazira Bank- Saudi National Bank- Saudi Awwal Bank#SaudiArabia#ddos #cyberattack #cti #threatintel -- FalconFeedsio
MEDUSA #ransomware group has added Lee University (leeuniversity.edu) to their victim list.#USA#medusa #cyberattack #darkweb #databreach -- FalconFeedsio
NoName claims to have targeted multiple websites in Spain.- Xunta de Galicia- Parlament de Catalunya- Generalitat Valenciana- Corts Valencianes- Parlamento de Galicia#Spain#ddos #cyberattack #cti #threatintel -- FalconFeedsio
LockBit #ransomware group has added 4 new victims to their #darkweb portal. - Sagacious IP- ABL Inc- Tri-State Truck & Equipment 🇺🇸- Craig Wire Products 🇺🇸#USA#lockbit #databreach #cyberattack -- FalconFeedsio
BlackBasta #ransomware has added Doyon (doyon.com) to their victim list.#USA#BlackBasta #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Just hours after declaring further targeting of Breach Forum, the hacker group Rootk1t ISC announced the shutdown of their own Telegram channel.😀 -- FalconFeedsio
NoName continues to target Spain.- Asamblea de Madrid- Gobierno del Principado de Asturias- FEPEX- IMDEA ENERGÍA- SURNE- Enagás- Bergé y Cía#Spain#ddos #cyberattack #cti #threatintel -- FalconFeedsio
RansomHub #ransomware group has added 2 new victims to their #darkweb portal.- Mercatino Franchising 🇮🇹- FabricaInfo 🇧🇷#Italy #Brazil#RansomHub #cyberattack #databreach -- FalconFeedsio
Ransomexx #ransomware group has added Asteco Property Management (asteco.com) to their victim list.#UAE#Ransomexx #cyberattack #darkweb #databreach -- FalconFeedsio
Cactus #ransomware group has added XD Connects (xdconnects.com) to their victim list.#Netherlands#Cactus #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Blackout #ransomware group has added HT Hospitaltechnik Planning Company (ht-hospitaltechnik.de) to their victim list.#Germany#Blackout #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Mydata/Alphalocker #ransomware group has added GEODIS (geodis.com) to their victim list.#France#cti #cyberattack #darkweb #databreach -- FalconFeedsio
Microsoft has tracked at least 70 Russian actors engaged in Ukraine-focused disinformation campaigns concentrated on undermining support for Ukraine. Meanwhile, China seeks to exploit societal polarization and diminish faith in US democratic systems: msft -- MsftSecIntel
Visual Analysis Uncovers Target of Israeli Airstrike: Iranian Consulate in Damascus dlvr.it/T5hx52 #OSINT #Medium -- osintbear
Unlocking Insights Your Trusted Partner for Comprehensive Background Checks and OSINT… dlvr.it/T5hfr3 #OSINT #Medium -- osintbear
Identifying the Telltale Signs of Surveillance: Are You Being Spied On? dlvr.it/T5hfpj #OSINT #Medium -- osintbear
A Comprehensive Guide to OSINT Basics dlvr.it/T5hZ4F #OSINT #Medium -- osintbear
Overview of the OSINT landscape in South Korea dlvr.it/T5gfq5 #OSINT #Medium -- osintbear
Business-focused OSINT with Netlas.io dlvr.it/T5gfll #OSINT #Medium -- osintbear
Open Source Intelligence Reddit Case Study | TryHackMe Advent of Cyber dlvr.it/T5gLhN #OSINT #Medium -- osintbear
DarkGPT — AI OSINT Tool Powered By ChatGPT-4 To Detect Leaked Databases dlvr.it/T5fm8H #OSINT #Medium -- osintbear
NiceRATCopycat of CStealerGitHubhttps://github[.]com/0x00G/NiceRATTelegramhttps://t[.]me/s/NicestRAThttps://t[.]me/areceoWebhttps://nicerat[.]com/#NiceRAT #RAT #Stealer #IOC -- suyog41
Stink Stealer- Python Stealer a3664d37321d58e90f0cd8d988216063#StinkStealer #Stealer #IOC -- suyog41
Sams Stealercb95c77750732c0a4dd29c1d4feb6f69#SamsStealer #Stealer #IOC -- suyog41
Reposted because we made over 9,000 typos (nearly impossible considering this is a small tweet) -- vxunderground
Yesterday @cahlberg , the CEO of @RecordedFuture, shared information on an unidentified Threat Actor attempting to SMS phish employees at their organization- This message was not sent to a Nikolas- Who the hell is Nikolas -- vxunderground
hacking is illegal and for nerds -- vxunderground
The author's alias is Gookee, not Gookie, but the ransomware name is Gookie lol. Sorry for the confusion. -- 3xp0rtblog
@BleepinComputer @vxunderground @ddd1ms @LawrenceAbrams @malwrhunterteam @pancak3lullz @sky31337 @AShukuhi @uuallan @Jon__DiMaggio @UK_Daniel_Card @SOSIntel @BushidoToken @BrettCallow @AlvieriD -- 3xp0rtblog
You can find a sample by a #malware name, family, technique, and vulnerabilities that the malicious program exploits. All the trending tags are displayed on the dashboard. 🧵 3/10 -- anyrun_app
Explore fresh malware samples in the "Public Submissions" window. Dive into tasks uploaded by users and learn about #malware techniques. Premium subscribers can analyze tasks privately. Only public submissions shared with the community are available here. -- anyrun_app
🔍  Hunting for malware samples to boost your cybersecurity skills? Look no further! In this thread, we will guide you through accessing free #malware samples and reports using #ANYRUN. Let's dive in! 🧵 1/10 -- anyrun_app
#PureLogs is a stealer belonging to the Pure #malware family 🏴‍☠️ Delivered by the #PureCrypter loader, it steals browser data, crypto wallets, and even files. Learn more & collect its #IOCs/samples➡️ any.run/malware-trends/purel… -- anyrun_app
Exciting update from #ANYRUN: PowerShell Script Tracer! 🎉Simplify your #PowerShell analysis with:- Step-by-step script analysis- Detailed breakdown of every function- Easy way to connect related functions' inputs and outputsLearn more⬇️any.run/cybersecuri -- anyrun_app
We hope we've helped you understand the important basics of how to get started analysing malware. Sign up for a free account today and have a go! 🧵 10/10app.any.run/?utm_source=twit… -- anyrun_app
The best overview of a sample is to examine its events in the process graph. A brief look, and you already know what is going on here. 🧵 9/10 -- anyrun_app
You can also export or print this report in a preferable form – hide blocks by clicking on the “eye” icon. xport options include JSON Summary, IOC, HTML, Process Graph (SVG), and MISP format. 🧵 8/10 -- anyrun_app
Convenient reports prioritize key data at the top. Detailed reports cover sample info, behavior, screenshots, process data, registry, files, network, debug output, ensuring no vital details are overlooked. 🧵 7/10 -- anyrun_app
Explore hash sums, DNS requests, connections, and HTTP/HTTPS requests. Easily copy and filter data. Icons and the number of IOCs let you run through the report and understand what you are dealing with at once. 🧵 6/10 -- anyrun_app
Different reports on our malware samples site can help you examine the malicious object. 🧵 5/10 -- anyrun_app
Apply one or several parameters to find a specific malicious example. Try it yourself with a possibly infected #IOC – use the filter, and similar cases will be displayed. 🧵 4/10 -- anyrun_app
Repeat after me: Patching an already compromised system won’t solve the problem#PaloAlto -- cyb3rops
Whoopsie Doodle -- DrunkBinary
Synapse Merge Request -- DrunkBinary
Passwords for a previously leaked (3years ago) "funnytorrent" that contained Witcher3, Gwent, CypherPunk 2047 and numerous other code sources from CD:Projekt RED have also been posted by the "HelloKitty" ransomware group. They have now rebranded to "Hello -- hackerfantastic
As part of the Lab Hosts phishing/eCrime arrests & takedown. UK police made a video bit mocking the attackers, it's pretty funny - news.met.police.uk/videos/la… -- hackerfantastic
Code Red rematch eta when? -- hackerfantastic
#phishing @ArubaithXXps://dsadsas-wondrous-site.webflow.io/hXXp://clienti-richiesta-home-aruba-it.codeanyapp.com/wp-admin/it/ -- JAMESWT_MHT
🤔 -- KorbenD_Intel
-- malwrhunterteam
"healloves.apk": aded4a95327ffefd41a2cf059255b16563caad89478a4172c6d0d67f81551c42 -- malwrhunterteam
"dolsingcam.apk": 45c99e8f20059fdeb75651d25afce62e43d1bf8265c1e7adc9e9f97ff329ec67 -- malwrhunterteam
But seriously, the fuck is "we don't agree that the vulnerability is valid because you are not one of the persons who should find such things"? I have no idea what is going on in that/those people's head.Braindead idiots...🤷‍♂️ -- malwrhunterteam
Domain: prominade.xseller[.]comResolving to: 194.116.216[.]2172 other related domains resolving to that IP:id-resume.ldop[.]comcv-export.lookids[.]com -- malwrhunterteam
"Indeed Resume Export 4001901\.zip": c796ea83815c2ea21228a5e4964cbe2f8a297648fd6e37928c1c722600c15051"Indeed Resume Export 4001901.pdf.lnk": fba6c3f93838656c9627006913ad14a6d9645998e72df06f3df2107e0ddd4980🤔@1ZRR4H -- malwrhunterteam
"twilight.ps1": d25b41e53e2a97c4812952c52eaca675d31fc64b2179ef529ebafe9bd9f310ce"You are in a VM, it is getting late.. goodnight""You are in a VM cores le 2, it is getting late.. goodnight"😂 -- malwrhunterteam
-- malwrhunterteam
-- malwrhunterteam
🔍Accessible detections🏭ICS Sub-Techniques🦹Under-represented groups🫡The sunset of TAXII 2.0And a whole lot more. Today ATT&CK's published our 2024 roadmap! Check out some of what's coming the rest of this year at medium.com/mitre-attack/atta…. -- MITREattack
Group: akiraApprox. Time: 16:49 18/04/24Title: Myers Automotive Gro up -- RansomwareNews
Group: bianlianApprox. Time: 16:49 18/04/24Title: B Capital Group -- RansomwareNews
Group: bianlianApprox. Time: 16:49 18/04/24Title: JE Owens and Company PA. -- RansomwareNews
Group: bianlianApprox. Time: 16:49 18/04/24Title: Western Saw Inc. -- RansomwareNews
Group: blackoutApprox. Time: 14:47 18/04/24Title: ht-hospitaltechnik.de -- RansomwareNews
Group: cactusApprox. Time: 14:47 18/04/24Title: xdconnects.com\$50.5M\Netherlands\1TB\<1% DISCLOSED -- RansomwareNews
Group: lockbit3Approx. Time: 12:51 18/04/24Title: sagaciousresearch.com -- RansomwareNews
Group: lockbit3Approx. Time: 12:51 18/04/24Title: ablinc.com -- RansomwareNews
Group: alphalockerApprox. Time: 10:56 18/04/24Title: geodis.com -- RansomwareNews
Group: ransomhubApprox. Time: 06:52 18/04/24Title: FábricaInfo <fabricainfo.com> -- RansomwareNews
Group: playApprox. Time: 00:54 19/04/24Title: SIS Automatisering -- RansomwareNews
Group: playApprox. Time: 00:53 19/04/24Title: Pennsylvania Convention Center -- RansomwareNews
Group: playApprox. Time: 00:53 19/04/24Title: P??????? & ???? -- RansomwareNews
Group: playApprox. Time: 00:53 19/04/24Title: JE Owens -- RansomwareNews
Group: playApprox. Time: 00:53 19/04/24Title: Engineered Automation of Maine -- RansomwareNews
Group: playApprox. Time: 00:53 19/04/24Title: Alltruck Bodies -- RansomwareNews
Group: lockbit3Approx. Time: 18:46 18/04/24Title: dc.gov -- RansomwareNews
Group: ransomhubApprox. Time: 16:49 18/04/24Title: Mercatino S.r.l. mercatinousato.com/ -- RansomwareNews
Hear from @Praga_Prag & @synth_nic0 on the techniques used by adversaries to gain & sustain access within a domain, including:✅ Credential dumping✅ Active Directory configuration syncing✅ Kerberos protocol manipulation✅ Certificate abuse👀: ghst.ly/3PLDBX8 -- specterops
Learn how BloodHound Enterprise can streamline mitigation efforts, eliminate millions of Attack Paths, and improve your security posture. Schedule a demo w/ our experts at #RSAC 👉 ghst.ly/4aXr1fA. -- specterops
Talos' @ImmortanJo3 was on @NPR #AllThingsConsidered last night discussing the importance of #GPS in keeping Ukraine's power grid on, and what Talos is doing to protect it npr.org/2024/04/17/124536694… -- talossecurity
今天offline,感恩没有在大礼包上缩水,江湖再见! -- timele9527
Cisco Talos researcher Vanja Svajcer writes about the OfflRouter VBA macro virus afecting users in Ukraine. blog.talosintelligence.com/o… -- virusbtn
Zscaler's Roy Tay & Sudeep Singh observed a malvertising campaign pushing the MadMxShell backdoor. The threat actor registered multiple domains spoofing legitimate IP scanners and other software typically used by IT security & network administration teams -- virusbtn
WithSecure researchers look into Kapeka, likely a new addition to Sandworm’s arsenal, used in attacks against victims in Eastern Europe. Kapeka is a flexible backdoor with all the necessary functionalities to serve as an early-stage toolkit. withsecure.co -- virusbtn
Google Mandiant researchers decided to graduate the Sandworm group into APT44 & release a report that provides additional insights into the group’s new operations, retrospective insights, & context on how the group is adjusting to support Moscow’s war aim -- virusbtn
17 AVs flag the newly released Team Fortress 2 64bit client as malware 😭SHA256: 83fb94ef1accdc0071ef6221f8e5acf870a1df31ff26e04a8d58116402793911 -- vxunderground
Hello, how are you? We've updated the vx-underground malware collection. We've added 68,000 new malware samples.Download the malware.- Virussign.2024.04.09- Virussign.2024.04.10- Virussign.2024.04.11- Virussign.2024.04.12- Virussign.2024.04.13- Virussign. -- vxunderground
tl;dr you're all going to prison forever (and ever) -- vxunderground
.@feege_ spotted a billboard advertisement on the i-95 in Philadelphia, near the Wells Fargo Center, that says: "Hackers Suck" "Protect your business. Cover your assets." -- vxunderground
It is fully cross platform***.Sorry, Marco. We made a typo (as is tradition). -- vxunderground
Half of the vx-underground roster were still not fully potty trained at 13, so we find this profoundly impressive. -- vxunderground
13-year-old Marco Liberale has created a proof-of-concept PasteBin C2 botnet in Go. Is it fully cross platform working on Windows, Linux, and Mac.We are very happy to see such a young person contributing to this research space.Check it out here: github.co -- vxunderground
Short blog post on bypassing BIOS passwords with hardware attackCredits @CyberCXInteresting reading if you're into hardware hackingblog.cybercx.co.nz/bypassing…#hardware -- 0xor0ne
Interesting reading (2022) for anyone into embedded/IoT devices analysis and exploitationExcellent research work by @hgarrereyn and @__comedianBlog post: margin.re/2022/06/pulling-mi…Slides (RECon): github.com/MarginResearch/re…#mikrotik -- 0xor0ne
Shall we say… Good bye, phishing queue? Part 2hexacorn.com/blog/2024/04/19…#SOC #phishing -- Hexacorn
Norton call back scam📞☎️Fake Scam number: +44 1245 790035Back in 2022 this number was used by a watch shop but it has been reissued to scammers using it for fraud⌚️ -- JCyberSec_
I'm heading out to Pittsburgh for NCFTA🖱️📢 I will be speaking on Telegram visibility on WednesdayIf you're going to be there drop me a DM let's grab a drink! 🍻 -- JCyberSec_
LabhostLabhostLabhostDOWN!!!! -- JCyberSec_
distro:https://pankerfan.]com/accessinformationhttps://pankerfan.]com/eft-edi-customerc2's https://djibek.]com/https://www.savetheworldpodcast.]com/https://retrobox.]rockshttps://dreamerz.]vnhttps://www.briccodeldente.]it -- Cryptolaemus1
#WikiLoader - #TA544 - .pdf > url > .zip > .js > .js > .dll wscript Invoice_818493.jswscript out.jsC:\Users\Admin\AppData\Local\Temp\npp.8.6.4.portable.x64\notepad.exe (sideload)👇\npp.8.6.3.portable.x64\plugins\mimeTools.dll(1/3) 👇IOC'sgithub.com/pr0xyli -- Cryptolaemus1
Samples 👇bazaar.abuse.ch/sample/3bca1…bazaar.abuse.ch/sample/dcae5…bazaar.abuse.ch/sample/3bca1… -- Cryptolaemus1
distrohttps://prominencedigiworld.]com/wp-content/plugins/hot-random-image/index.htmlhttps://gihibml.]org/vl.phphttp://krd6.]com/share/c2'shttp://85.239.53.]219/api/gatewayhttp://85.239.53.]219/download?id=Nevada&module=2&filename=None -- Cryptolaemus1
#SSLoad - #TA578 - url > .js > smb > .msi wscript.exe Doc_m42_81h118103-88o62135w8623-1999q9.jsnet use A: \\krd6.]com@80\share\ /persistent:nomsiexec.exe /I avp.msimsiexec.exe /V(1/3) 👇IOC'sgithub.com/pr0xylife/SSLoad/… -- Cryptolaemus1
Samples 👇bazaar.abuse.ch/sample/0112e…bazaar.abuse.ch/sample/44eb0…bazaar.abuse.ch/sample/1d6f7… -- Cryptolaemus1
Microsoft has uncovered an attack that exploits critical vulnerabilities in OpenMetadata to gain access to Kubernetes workloads and leverage them for cryptomining activity. Get our analysis, IOCs, and investigation guidance: msft.it/6012YB57m -- MsftSecIntel
6/xEl canal en concreto fue creado apenas el 7 de abril, comenzando a publicar a partir del 13 del mismo.Otro dato es el nombre, pues el usuario es distinto al que es manejado en el foro, lo que puede hablarnos del inicio de una "marca personal". -- n4hualH
5/xComo ya se dijo, el actor de amenazas tiene un canal de Telegram, donde ha compartido otros logs similares, pertenecientes a otros países, etc. -- n4hualH
4/xPor lo tanto, parece muy poco probable que se tratara de la explotación de una vulnerabilidad en los servidores Gubernamentales, y más bien es el resultado del despliegue de una campaña dirigida contra los usuarios. -- n4hualH
3/xEn este caso, se trató de credenciales extraídas de dispositivos que fueron infectados con un Stealer, tipo de malware ampliamente utilizado por los cibercriminales para extraer este tipo de información, con el fin de ser accionada en otro tipo de deli -- n4hualH
2/xConcretamente, el listado de credenciales se encuentra en el apartado de "Stealer Logs" del foro.Este dato es importante, pues permite identificar el origen de la filtración. -- n4hualH
1/xRespecto a la filtración de credenciales de usuario reportada por @victor_ruiz hace unas horas, investigué un poco y encontré lo siguiente: -- n4hualH
Google Dorking dlvr.it/T5djmh #OSINT #Medium -- osintbear
Unveiling the Secrets of Cyberspace: A Journey with GoogleFU and OSINTgram dlvr.it/T5dFjP #OSINT #Medium -- osintbear
Open Source Intelligence Tools & Techniques Explained With Case Studies dlvr.it/T5cZDN #OSINT #Medium -- osintbear
Open Source Intelligence (OSINT) Market Analysis and Strategies | Current and Future Scenarios dlvr.it/T5cT2N #OSINT #Medium -- osintbear
Osintracker V2.7 — Connectors dlvr.it/T5cN06 #OSINT #Medium -- osintbear
OSINT Exercise #023 dlvr.it/T5c0Pz #OSINT #Medium -- osintbear
OSINT Exercise #020 dlvr.it/T5c0Pd #OSINT #Medium -- osintbear
Hunting and analysing (Windows) vulnerable kernel drivers by Takahiro Haruyama (@VMware)blogs.vmware.com/security/20…#Windows -- 0xor0ne
This is an excellent series on virtualization technologies and internals of various solutions (QEMU, Xen and VMWare)Credits @LordNoteworthyIntro: docs.saferwall.com/blog/virt…VMWare: docs.saferwall.com/blog/virt…Xen: docs.saferwall.com/blog/virt…QEMU: doc -- 0xor0ne
Very interesting reading on reverse engineering rail ticketseta.st/2023/01/31/rail-ticke…#reverseengineering #infosec -- 0xor0ne
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities | wired.com/story/cyber-army-o… @WIRED -- 780thC
APT44: Unearthing Sandworm: services.google.com/fh/files… | Report "provides additional insights into the group’s new operations, retrospective insights, and context on how the group is adjusting to support Moscow’s war aims." -- 780thC
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm | Given the active and diffuse nature of the threat posed by Sandworm globally, @Mandiant has decided to graduate the group into a named Advanced Persistent Threat: APT44. cloud.google.com -- 780thC
WithSecure uncovers Kapeka, a new malware with links to Russian nation-state threat group Sandworm | withsecure.com/en/whats-new/… @WithSecure -- 780thC
The original website was published last week and several more copycats have been set up with new iOS “zero-days.”@TrustWallet #CyberSecurity -- alvieriD
# new fake iOS zero-day exploit for sale<again>CodeBreach Lab is the same named lab who advertised the fake iOS iMessage exploit & mentioned also for $2 million.</again>credible intel -- alvieriD
Another day another hacked account advertising a crypto scam. @Support Maybe I should work for @x to clear this all up here @elonmusk -- alvieriD
UPDATE - ETAC tracks this leaked Babuk+LB3 using adversary as "ETG-01"+2 Ransom Notes:2024-04-15 | 39129f319a006fc4de1854412dc4c2313b47d27e8ea1c344774be4b887b1ca44 | AKGUM| 🇪🇸2024-04-13 | e2afade3e08b23b338a5c1dc86978541430dbd5e42ea79156eb2262eb5e3155d | -- bushidotoken
We’re kicking off Day 3 of #FOR589 aka “The Crypto Day” 🧱⛓️‍💥+🔒🔑+💰🤝 -- bushidotoken
They finally graduated cloud.google.com/blog/topics… -- bushidotoken
FSB officer sent to 9 years in maximum security penal colony for taking bribes from the Infraud cybercrime crewThis and more: mastodon.social/@campuscodi/… -- campuscodi
NASA's Earthdata Search provides user-friendly access to EOSDIS services, facilitating the discovery, filtering, visualization, and retrieval of Earth science data.worldview.earthdata.nasa.gov@NASA#GEOINT #OSINT #CTI #intelligence #ThreatIntel #infosec #c -- DailyOsint
The #sisense intrusion is still somewhat of a developing situation, with not a lot of details known at this point.invidious.no-logs.com/Uk3IkuzRGTU?si=WW__… -- DecipherSec
UnitedHealth Took $872M Hit From Change Cyberattack decipher.sc/change-healthcar… #decipher #deciphersec -- DecipherSec
Critical Crypto Bug Fixed in PuTTY decipher.sc/critical-crypto-… #decipher #deciphersec -- DecipherSec
New research:SoumniBot: the new Android banker’s unique techniques 👉 kas.pr/i1sq -- e_kaspersky
Hacktivist group the anonymous Bangladesh is likely to target India with a potential cyber attack. The group was seen targeting Jordan for past few days. #Cyberattack #India #Cti #DDoS -- FalconFeedsio
Ciphbit #ransomware group has added TrueNet Communications (truenetcommunications.com) to their victim list.#USA#Ciphbit #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Cactus #ransomware group has added DRM, Inc.(drmarbys.com) to their victim list.#USA#Cactus #cti #cyberattack #darkweb #databreach -- FalconFeedsio
NoName continues to targets Poland. Today marks the 7th day of the attack. - e-Toll- pks.pl- Gdańsk Transport Company- PKS Polonus#Poland#ddos #cyberattack #cti #threatintel -- FalconFeedsio
LockBit #ransomware group has added Rehab Group (rehab.ie) to their victim list.#Ireland#lockbit #cti #cyberattack #darkweb #databreach -- FalconFeedsio
BianLian #ransomware group has added 2 new victims to their #darkweb portal. - Len Dubois Trucking 🇨🇦 - Pioneer Oil Company 🇺🇸#Canada#USA#BianLian #darkweb #databreach #cyberattack #cti -- FalconFeedsio
RansomHouse #ransomware group has added Lopesan Hotels (lopesan.com) to their victim list. #Spain#ransomhouse #databreach #darkweb #cyberattack #cti -- FalconFeedsio
RansomHub #ransomware group has added Empresa de Energía Del Bajo Putumayo (eebpsa.com.co) to their victim list.#Colombia#RansomHub #cyberattack #darkweb #databreach -- FalconFeedsio
BLACK SUIT #ransomware group has added 2 new victims to their #darkweb portal. - UPC Technology 🇹🇼- D&V Electronics 🇨🇦#Taiwan#Canada#blacksuit #databreach #cyberattack #cti -- FalconFeedsio
8/x@victor_ruiz @capitan_raul @cynsol @rleon_mx -- n4hualH
7/x Finalmente, al momento de escribir esto, la lista de credenciales ha sido bajada 4 veces.Por lo tanto, sí, dicha información está comenzando a ser de interés. -- n4hualH
SHARPIL RAT177a73014d3c3455d71d645c1bf32a9f#SHARPILRAT #RAT #IOC -- suyog41
There is also some discussion surrounding 'private' Discords being scraped. Unfortunately, most 'administrators' of 'private' Discords leave the front door wide open (Discord invite links that never expire) – coupled with no channel roles, leaving everyth -- vxunderground
It should be noted that some of your favorite Cyber Threat Intelligence companies do mass data aggregation from Discord for a wide variety of customers.Maybe it's just an open secret? ¯\_(ツ)_/¯ -- vxunderground
We've witnessed a significant spike in people discussing the 'spy tool' which collects and aggregates Discord conversation en masse.This service has existed for awhile and is not the first organization who does this type of data collections.tl;dr talking -- vxunderground
ok we found it here:all credit goes to him or whoever idk -- vxunderground
babe wake up mandiant just released artwork for sandworm aka apt44 (officially) -- vxunderground
Today a group named 66slavs claimed to have breached the United States National Energy Research Scientific Computing Center (NERSC).* We have not reviewed the data* Yes, they watermarked a data breach -- vxunderground
💻 Ever wondered how cyber threats disguise themselves to avoid detection? In this article, we explore the intricate techniques of obfuscators such as .NET Reactor and #SmartAssembly. Get ready to explore deobfuscation techniques and create own tools 👇any. -- anyrun_app
Top #Malware Types in Q1 2024 🦠We're excited to share the latest insights from #ANYRUN uploads: uncover the prevalence of #stealer, #loader, #ransomware, popular #MITRE TTPs and more in our Q1 statistics.More at ↘️any.run/cybersecurity-blog/m… -- anyrun_app
Mark -- blackorbird
-- cyb3rops
#PaloAltolabs.watchtowr.com/palo-alto… @watchtowrcyberlinkedin.com/posts/justinelz… @HackingLZ -- cyb3rops
easybackend.iol0lio0liollliolio0ii0olli0[.]cc -- malwrhunterteam
191.96.225[.]117🤔@1ZRR4H -- malwrhunterteam
🤦‍♂️😂 -- malwrhunterteam
Group: bianlianApprox. Time: 22:49 16/04/24Title: Pioneer Oil Company, Inc. -- RansomwareNews
Group: ransomhouseApprox. Time: 22:49 16/04/24Title: Lopesan Hotels -- RansomwareNews
Group: blacksuitApprox. Time: 16:49 16/04/24Title: upc.com.tw -- RansomwareNews
Group: akiraApprox. Time: 16:49 16/04/24Title: Wright Brothers Cons truction -- RansomwareNews
Group: akiraApprox. Time: 16:49 16/04/24Title: Medequip Assistive T echnology -- RansomwareNews
Group: lockbit3Approx. Time: 16:48 16/04/24Title: hbmolding.com -- RansomwareNews
Group: akiraApprox. Time: 14:52 16/04/24Title: Studio LAMBDA -- RansomwareNews
Group: huntersApprox. Time: 12:56 16/04/24Title: City of St. Cloud, Florida -- RansomwareNews
Group: cactusApprox. Time: 12:56 16/04/24Title: aerodynamicinc.com\$22,6M\USA\1.1TB\100% DISCLOSED -- RansomwareNews
Group: cactusApprox. Time: 12:56 16/04/24Title: besttrans.com\$24.8M\USA\24GB\100% DISCLOSED -- RansomwareNews
Group: blacksuitApprox. Time: 01:02 17/04/24Title: dvelectronics.com -- RansomwareNews
Group: cactusApprox. Time: 12:56 16/04/24Title: regencyfurniture.com\$369M\USA\300GB\100% DISCLOSED -- RansomwareNews
Group: ransomhubApprox. Time: 22:49 16/04/24Title: Empresa de energía del Bajo Putumayo <eebpsa.com.co> -- RansomwareNews
Group: cactusApprox. Time: 12:56 16/04/24Title: mcalvain.com\$199M\USA\175GB\100% DISCLOSED -- RansomwareNews
Group: ransomhubApprox. Time: 22:49 16/04/24Title: [UPDATE] Robeson County Sheriff's Office <robesoncoso.org> -- RansomwareNews
Group: akiraApprox. Time: 12:56 16/04/24Title: Lotz Trucking -- RansomwareNews
Group: ransomhubApprox. Time: 22:49 16/04/24Title: Change HealthCare - OPTUM Group - United HealthCare Group - FOR SALE -- RansomwareNews
Group: huntersApprox. Time: 06:54 16/04/24Title: St. Cloud Florida -- RansomwareNews
Group: ransomhubApprox. Time: 22:49 16/04/24Title: Grupo Cuevas<grupocuevas.es> -- RansomwareNews
Group: bianlianApprox. Time: 22:49 16/04/24Title: Len Dubois Trucking -- RansomwareNews
The `A` in ATT&CK does NOT stand for adversary!!Join @LexOnTheHunt at @BSidesCharm this Saturday at 1130am ET for a breakdown of the defender's perspective of what it really means to "use" ATT&CK to detect & protect against threats #BSidesCharm💙 -- MITREattack
ICYMI: Last week @_Mayyhem released the open-source scanner MisconfigurationManager.ps1, which helps administrators more easily identify weaknesses in their SCCM environments.Check out @CSOonline to learn more. ⬇️ ghst.ly/4aWw1AV -- specterops
We are just hours from our Solutions Demo! ⏰Join to learn why you should care about Attack Paths and how BloodHound approaches identification and remediation. It's not too late to save your spot.Register at ghst.ly/3VNnJXF -- specterops
We will be at #RSAC in May! Visit us at Booth 4605 in the Moscone North Expo Hall to meet with our experts and receive a demo of BHE! Learn more and schedule your demo at ghst.ly/4aXr1fA. -- specterops
We are actively monitoring a global increase in brute-force attacks against a variety of targets, VPN services, web application authentication interfaces and SSH services. Read more on our blog on how to be prepared cs.co/6016b6MEr -- talossecurity
How worried should we be about the state of critical infrastructure security in the U.S.? We discuss on the latest episode of Beers with Talos! -- talossecurity
Secureworks CTU researchers look into activity conducted by the INC Ransom group, tracked as GOLD IONIC. secureworks.com/blog/gold-io… -- virusbtn
G DATA's Banu Ramakrishnan writes about a malicious Android app that masquerades as Google Chrome. The malware takes advantage of the popularity of and trust associated with Chrome to trick users into downloading and installing it. gdatasoftware.com/blog/ -- virusbtn
🔒 Beware of phishing attacks on your iPhone! Hackers are using cunning techniques to trick users into revealing sensitive information. Stay alert and protect your device! #CyberSecurity #Phishing #iPhoneSafety #aimnxt -- aimnxt39393
Following the first part of the #APT29 #NOBELIUM attack, I am picking up from where we last off in the first part, shedding light on the latter components of the #malware infection chain and going through each in-depth.Your feedback is appreciated:)blu3ey -- BlueEye46572843
Elevate your career in network security #elysiumacademy #jobassurance #tesbo #no1trainingacademy #cybersecurity #ethicalhacking #hackers #programming #hack #technology #security #coding #tech #ethicalhacker #pentesting #cyber #malware #programmer #informa -- elysiumacademy
🚨Major Threat Alert: Microsoft finds Kubernetes clusters targeted by OpenMetadata exploits - #CVE-2024-28253CVE-2024-28255CVE-2024-28847CVE-2024-28253CVE-2024-28848Chatter: ⚠️ CriticalMaturity: 💥 Mainstreamfletch.ai/p/cve-2024-28253#CyberSecurity #ThreatI -- fletch_ai
🚨Major Threat Alert: Several botnets set sights on vulnerable TP-Link routers - #CVE-2023-1389CVE-2023-1389Chatter: 🔴 HighMaturity: 💥 Mainstreamfletch.ai/p/cve-2023-1389#CyberSecurity #ThreatIntel #InfoSec -- fletch_ai
DM ahora #coins #btc  #Bitcoin  #Bitcoin  inbox ahora para todos los servicios de recuperación de cuentas, perdidos o suspendidos, inbox ahora #phishing #phish #hacked #iloud #facebookdown #imessage #ransomware #snapchat # #whatsapp -- Geekcore_cyber
e cómo recuperar tu cuenta #Hacking #snapchatdown #5g #icloud #snapchatleaked #phishing #phish #phish #hackedgmail #hackedinstagram Si tu cuenta está pirateada, o tu cuenta está siendo templada, todo lo que necesitas es un buen hacker.. -- Geekcore_cyber
envíame un mensaje de texto para cualquier piratería o bypass activo 24/7 #anyomous #sadapwhatsapphack #hackinstagrammurah #facebook #hackerstayaway #hackingout #accounthacking #mobilehacking #hackgmail #hacksnapchat #blackhathacker #hackerindia #phishing -- Geekcore_cyber
envíame un mensaje de texto para cualquier piratería o bypass activo 24/7 #anyomous #sadapwhatsapphack #hackinstagrammurah #facebook #hackerstayaway #hackingout #accounthacking #mobilehacking #hackgmail #hacksnapchat #blackhathacker #hackerindia #phishing -- Geekcore_cyber
Offering the best recovery services.All social media accounts hacking, Infiltration, and recovery.#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #hacked #coinbasesupport #wal -- GodsentFirm
estou online 24/78 Mande-me um email #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #Lockedaccount #metamask #ransomware #alterworld -- HACKER_MADOXX
أنا متواجد 24/78 أرسل لي بريدا الكترونيا #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown # Lockedaccount #metamask #ransomware #alterworld -- HACKER_MADOXX
أرسل لي بريدا الكترونيا #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld إذا كنت بحاجة إلى مساعدة في استعادة أي حساب تم اختراقه أو رسائل بريد إلكتروني أو Tiktok أو Snapchat أو Instagram وما إلى -- HACKER_MADOXX
Vijf Nederlanders opgepakt in internationaal onderzoek naar phishingbende nu.nl/tech/6309502/vijf-nede… #phishing #cybersecurity #awareness -- HighFiveLearn
The Best Business VPN in 2024- The best VPN for business protects your company from online threats and allows limitless access following a one-time payment.businesspartnermagazine.com/…#VPN #DataSecurity #CyberSecurity -- Hinshelwood_S
How to Protect Water Systems Against Cyber Attack  Governing dlvr.it/T5jD3G #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Phish just shredding the first song at the @SphereVegas@phish #phishing -- Jackson_87_MLB
Is httpx working correctly?I just installed it and it doesn't correspond to any flag that I use #bugbountytip , #Nahamsec, #GodfatherOrwa,#infosec -- kenneth__OS
Want to decrypt a social media message to prank your friend? Dm for a professional exclusive and confidential service #hackattack #hacker #darkweb #darkwebuser #incognito #phishing#roblox -- kenstarbreach_
#Phishing #SMBC #SMCC #三井住友カード IP:89.187.28.238(AS 396356 / LATITUDE-SH )hxxps://365xinfu.comhxxps://ahxituo.comhxxps://alibbe.comhxxps://fdayxj.comhxxps://tlpifa.comhxxps://www.smbcsupport.world -- KesaGataMe0
三菱UFJ銀行のフィッシングサイト情報です⚠hxxps://www.adyilian.comhxxps://www.hydlist.comip: 43.163.229.30 (AS132203 - Tencent)Registrar: GnameScan Log:urlscan.io/result/95882f11-b…urlscan.io/result/1942a350-d…#Phishing #MUFG #三菱UFJ銀行 -- kubotaa3
#Phishing #住信SBIネット銀行hxxps://netbk.co-contents.nfgyto.cnhxxps://netbk.co-contents.wnndktr.cnhxxps://netbk.co-contents.wpsmjw.cnip: 134.122.186.134  (AS152194 - BGPNET Global ASN)Scan Log:urlscan.io/result/3594d3fc-8…urlscan.io/result/61eaf4e7-5…urlscan.io -- kubotaa3
"American telecom provider Frontier Communications is restoring systems after a cybercrime group breached some of its IT systems in a recent cyberattack."+ info 🔗: bleepingcomputer.com/news/se…#offensivesecurity #pentest #redteam #cybersecurity #cybernews -- OpenSec
“Totally Unexpected” Package Malware Using Modified Notepad++ Plug-in (WikiLoader) asec.ahnlab.com/en/64106/ #Pentesting #Malware #CyberSecurity #Infosec -- ptracesecurity
Palo Alto Products Remote Code Execution Vulnerability - redpacketsecurity.com/palo-a…#threatintel -- RedPacketSec
Another #Phishing #Patent Granted 2 days ago.I got more than few dozens on #phishing #cybersecurity #ztna #vishing #smishing #insiderthreat #credentialharvesting #zerotrust Every night, build and cultivate your #skillpower #brainpowerKeep Rocketing!#Rocke -- RocketSikh
By assuming nothing can be trusted, zero trust and robust authentication help address the limitations of traditional perimeter-based security models. thenewstack.io/why-you-shoul… #CyberSecurity #API #APIsecurity @ambassadorlabs -- thenewstack
🚨 Alerta @GobiernoMS_ 🇪🇨Desde el 09 de abril de 2024, se ha detectado una campaña de #phishing desde mail.gpms.gob[.]ec. Los mensajes fraudulentos están siendo enviados con el siguiente asunto: "Re: aviso de último año"y contienen el siguiente texto:"Cerr -- V3n0mStrike
Traditional SD-WANs are vulnerable to lateral #threat movement. The #Zscaler Zero Trust SD-WAN minimises both overheads and #ransomware risks. In this blog, Jay Chaudhry explains why #ZeroTrust solutions will replace SD-WANs. Check it out👉 spklr.io/6012oZ -- zscaler
Advanced #cybersecurity performance translates to higher shareholder returns bit.ly/3UgHS7w via @SecurityHIT #healthcare -- Derek_Griffin1
OSI Reference Model#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips -- hackinarticles
IPv4 vs IPv6#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips -- hackinarticles
【SecurityNext】開示したNPO法人事業報告書で墨塗り漏れが判明 - 山口県 #cybersecurity #security #news security-next.com/156089 -- IT_security_bot
Protect all family devices seamlessly with Quick Heal! Safeguard Windows PC, Mac, and Android with one product key for comprehensive security. Ensure your loved ones' safety today! kaspen.in#kaspen #business #QuickHeal #cyberSecurity #antivirusprotection -- ItKaspen
From choosing secure connections to handling suspicious links and using strong passwords, discover what influences your #cybersecurity habits the most.Read our full report ⇒ kas.pr/97vf -- kaspersky
Watch #GoogleCloudConsulting VP Lee Moore on Bloomberg TV sharing the new #GoogleCloudCertificate program and courses in gen AI, #cybersecurity, and #DataAnalytics that expand onramps to economic opportunity with colleges, universities, & employers💡 googl -- larsdominic
Join us at #GISECGLOBAL, April 23-25, in Dubai! Explore the largest #cybersecurity expo in the Middle East & Africa with @QseapInfotech. Don’t miss out on 300+ hours of insights from global leaders, networking with attendees & 750+ brands. DM us to meet u -- QseapInfotech
#Malware#CyberAttack#ThreatIntel@hasherezade@JusticeRage@Nima__Nikjoo@lauriewired@herrcore@vxunderground@MalwareHuntress@embee_research@HuskyHacksMK@onlymalware@kucher1n@kaspersky@SentinelOne@MalFuzzer@AnFam17@Unit42_Intel@harfanglab -- BlueEye46572843
🚨URGENT🚨A Zero-day LPE exploit for Windows is up for sale.#DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #0Day #ZeroDay #Windows #ExploitPrice: $250,000Threat Actor note: The exploit isn't related to any CVE without PoC -- DarkWebInformer
Cactus #ransomware group has added XD Connects (xdconnects.com) to their victim list.#Netherlands#Cactus #cti #cyberattack #darkweb #databreach -- FalconFeedsio
🚨Major Threat Alert: FBI: Akira ransomware raked in $42 million from 250+ victims - #AkiraChatter: 🔴 HighMaturity: 💥 Mainstreamfletch.ai/p/akira#CyberSecurity #ThreatIntel #InfoSec -- fletch_ai
Security researchers reveal spear-phishing campaign targeting the IT department in a US automaker#cybersecurity #threatintel #autoindustry #USAblogs.blackberry.com/en/2024… -- rfwaveio
🚨ALERT🚨Frontier Communications Parent, Inc. has filed form 8-K due to a cybersecurity incident.#Ransomware #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Malware #Infosec #CTIThe notice states:On April 14, 2024, Frontier Communications -- DarkWebInformer
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #RansomwareGroup#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagr -- Geekcore_cyber
Hacking is a lot easier when you connect with the right hacker. Get All Your Hacking Services Inbox Now I'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #missingphone👾👾 #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #r -- Geekcore_cyber
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #RansomwareGroup#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagr -- Geekcore_cyber
XZ Utils バックドア騒動:ソフトウェア・セキュリティの問題点が浮き彫りにiototsecnews.jp/2024/04/11/x…#CVE20243094 #CyberAttack #Exploit #HarvardBusinessSchool #Linux #Malware #OpenSource #RAT #Tidelift #TTP #Vulnerability #XZUtils -- iototsecnews
8 strange ways employees can (accidently) expose data📌bit.ly/3M633Dj#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- kenstarbreach_
強制密碼過期還有利於破壞您的密碼安全嗎? #DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- kenstarbreach_
Offering the best recovery services.All social media accounts hacking, Infiltration and recovery.#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #hacked #coinbasesupport #wall -- kenstarbreach_
Is mandatory password expiration helping or hurting your password security?🧨bit.ly/3UZnwhl#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- kenstarbreach_
#Phishing #Apple #AppleID hxxps://idpeen.com(AS13335 - CLOUDFLARENET) -- KesaGataMe0
#Phishing #Apple #AppleID IP:69.176.95.36(AS 64050 / BGPNET Global ASN )hxxps://idaoesyb.cc -- KesaGataMe0
#PeckShieldAlert #Phishing An address 0x71ac...c913 has fallen victim to a phishing attack, resulting in a loss of 190.26K $MAGIC (worth ~$143.2K) #PinkDrainer #Arbitrum -- PeckShieldAlert
If you need help recovering any account, emails, Tiktok, Snapchat, Instagram etc. I'm available 24/7 Send me an inbox #hacked#facebookdown #whatsapp#hackedinstagram#twitterdown #lockedaccount#metamask #ransomware -- shawcracks
I will be hosting a session on Crossroads of AppSec and genAI at the University of Chicago on May 15th/16th#Domino24#cybersecurity#Veracode -- Siqbal00
Global sting sees #Australian offenders arrested for #cybercrime and #phishing attacks@dramitsarwal @Pallavi_Aus @ShailendraBSing @opdwivedi82 @AusFedPolice Read here: theaustraliatoday.com.au/glo… -- TheAusToday
PeckShieldAlert: #PeckShieldAlert #Phishing An address 0x71ac...c913 has fallen victim to a phishing attack, resulting in a loss of 190.26K $MAGIC (worth ~$143.2K) #PinkDrainer #Arbitrum -- web3_watchdog
Malware Development Series => [+] Rc4 Shellcode Encryption: github.com/Whitecat18/Rust-f…[+] Rc4 Encrypted Shellcode Execution: github.com/Whitecat18/Rust-f…[+] Fixed APC Injection: github.com/Whitecat18/Rust-f…#maldev #rust #redteam #cybersecurity #infos -- 5mukx
#IdentityBridge serves as the ultimate integrator, bridging gap between various apps & databases. It fortifies organizations against threats, safeguarding sensitive data, while prioritizing seamless access for end-users. bit.ly/485RyWB#ITSecurity #Cyberse -- avancercorp
"Today we introduced the most consequential security product in Cisco’s history." 📢 Learn about #CiscoHypershield – Security for the age of AI from EVP and GM, Security and Collaboration @jpatel41 🛡️➡️ cs.co/6013bJpnZ@CiscoSecure | #cybersecurity -- Cisco
In 2023 @Cybersixgill detected an 88% increase in compromised endpoints and a 17% increase in compromised domains for sale vs. 2022. 😱🤔Wondering what this means for your organization? Find out!👉 hubs.ly/Q02tq5XR0 #cybersecurity #cybercrime #threatintel -- Cybersixgill
Looking for assets in the AWS IP range?Try awsScrape, a tool designed to scrape certificates across all AWS IP ranges and search for custom keywords.github.com/jhaddix/awsScrape#OSINT #CTI #investigation #intelligence #infosec #reconnaissance -- DailyOsint
⚠️NOT EVIL⚠️This is 'Not Evil'. Not Evil is a no ad Onion search engine that is simple and provides good results.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT #Infosec #NotEvilHave an Onion: notevilmtxf25uw7tskqxj6 -- DarkWebInformer
🚨EXIT SCAM🚨Cypher Market is exit scamming. DO NOT use it. New Darknet Market rankings will be out tomorrow. If you use Darknet Markets, stick to Archetyp. #CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cypher #Archetyp #OSINT #Infos -- DarkWebInformer
⚠️POLL⚠️Do you use Darknet Markets? This is specially if you use them as a buyer or vendor.. NOT research. #Clearnet #DarkWebInformer #DarkWeb #Darknet #Cyberattack #Cybercrime #Infosec #CTI -- DarkWebInformer
🚨PoC ALERT🚨This PoC creator is only 13 years old.#Clearnet #DarkWebInformer #DarkWeb #Exploit #PoC #Cyberattack #Cybercrime #PasteBomb #Infosec #CTIPasteBomb is a simple, yet powerful, remote administration Trojan (RAT) that allows you to execute terminal -- DarkWebInformer
Navigating the cyber landscape? Threat Exposure Management is key to identifying vulnerabilities before they're exploited, ensuring your systems stay robust & resilient. Stay ahead of threats with the right strategies! #CyberSecurity #ThreatManagement #Ri -- JCorcione
Is mandatory password expiration helping or hurting your password security?#phishing #Windows #icloud #ios#AndreaBrillantes #manifestation #HackedAccount -- kenstarbreach_
Is mandatory password expiration helping or hurting your password security?#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- kenstarbreach_
Is mandatory password expiration helping or hurting your password security?#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- kenstarbreach_
"Target Locked: Operation Sharpshooter" published by AttackIQ. #Sharpshooter, #CTI, #OSINT, #LAZARUS attackiq.com/2024/04/17/oper… -- lazarusholic
🚨 Explore the rising threat of cyberattacks leveraging System Center Configuration Manager (SCCM) in our newest blog post. Gain expert insights and learn how to protect your organization. Read now: bit.ly/4aIxhrS#Cybersecurity #SCCM -- Mandiant
Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. github.com/hakaioffsec/CVE-2… #Pentesting #Windows #CyberSecurity #Infosec -- ptracesecurity
Understanding #Ransomware Attacks, Its Origin and Impact #technodized #thetechnodized #technology technodized.com/security/ran… #Cybersecurity -- thetechnodized
📢 #Yeti is now part of the ODFIR infrastructure automation project! It's never been easier to connect it to a @TimesketchProj instance and enrich all your sketches with juicy forensics intelligence ✨ More details here 👇🏻osdfir.blogspot.com/2024/04/…#DFIR -- tomchop_
Hoe bescherm je je privacy in het digitale tijdperk: een gids trendingtech.news/trending-n… #Privacybescherming digitaal #veilige wachtwoorden #tweestapsverificatie #beveiligingssoftware #phishing-aanvallen #Trending #Tech #Nieuws -- TrendingNewsBot
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
꧁Specialized in all recovery/disabled accounts, Web3 developer, Spy 🕵️‍♂️|Private Investigation, TI's, Crypto recovery꧂ #spam #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #privacy #yrkkh #naagin #infosec #hackathon #kalilinux #malware # -- Andrewlambs1
I'm available 24/7 by email if you require assistance retrieving any accounts, emails, Tiktok videos, Snapchat, Instagram, or other data.#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #hacking #ransomware #snapchat #snapchats -- CYBER_CAS
I'm available 24/7 by email if you require assistance retrieving any accounts, emails, Tiktok videos, Snapchat, Instagram, or other data.#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #hacking #ransomware #snapchat #snapchats -- CYBER_CAS
Cyber Fusion Centers serve as a linchpin in fortifying cyber defense mechanisms and streamlining operational efficiency. In his @Finextra article, Cyware CEO Anuj Goel shares important use cases that benefit financial institutions.bit.ly/49Ii095#CTI #SOAR -- CywareCo
Great work by police to help bust a global #phishing scam. Everyday Australians are duped out of their hard earned savings by scammers. Whilst a small win, it’s a symbol of hope in finding and arresting #scammers #cybersecurity abc.net.au/news/2024-04-18/ -- imcallingyouou2
-ランサムウェア攻撃 アラート-公開日時: 2024-04-18被害企業: ​Doyon​ランサムグループ: blackbasta#Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア1713406201 -- IntelVictims
【GIGAZINE】パスワード管理ソフトウェア・LastPassの従業員を「AIで複製されたCEOの声」でだまそうとする事案が発生 #cybersecurity #security #news gigazine.net/news/20240418-l… -- IT_security_bot
🚨 icymi - you can catch the replay of the first #MalwareMondays! This series will help build core #malware #analysis and #reverse #engineering skills! Episode 0x01 looks at analyzing #procmon data 👇invidious.no-logs.com/live/b5_PUMmpwjk…Artifacts at:thecy -- jstrosch
#Phishing #SMBC #SMCC #三井住友カード IP:87.121.112.36(AS 34224 / Neterra Ltd. )hxxps://www.chinaresun.com -- KesaGataMe0
Add 'servudaemon.ini' to the wordlist, and maybe you will get juicy data. Enjoy!Created a nuclei template for it: github.com/NoRed0x/nored0x-N…#bugbountytips #bugbountytip #cybersecurity #ethicalhacking -- NoRed0x
From Water to Wine: An Analysis of WINELOADER splunk.com/en_us/blog/securi… #Pentesting #CyberSecurity #Infosec -- ptracesecurity
🎣 Heads up, Windows users! A new corporate #phishing campaign has been exposed by the FortiGuard Labs team. This cunning campaign tricks users into clicking on attachments that deliver remote access Trojans and other #malware: ftnt.net/6010byqoQ via @dark -- SDCarter10
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #RansomwareGroup#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagr -- shawcracks
ahora DM restaura todas las cuentas sociales y personales. #gmailhack #hackeado #hacking #hackaccount #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #hacked #iloud #missingphone #phishing -- Tayixr33
Is mandatory password expiration helping or hurting your password security?#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- WebWizard_inc
8 strange ways emproyees can (accidently) expose databit.ly/3M633Dj#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing#Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- WebWizard_inc
日本語マルウェアメールの接到を確認しています。 #malspam in Japanese #agentteslaSubject : 100% 支払い確認MD5 : 353b549e5cd77a656cc2a85ffe1c6900C2 : mail[.]geasa[.]hnSample : virustotal.com/gui/file/58a7… (29/61) first posttria.ge/240417-rlp9bach8w/be… -- 58_158_177_102
Offering the best hacking, infiltration and recovery services on all social media accounts. #NFT#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #coinbasesupport #walletphrase -- ASTRA_cyberhack
As a Cyber security, hacking is easy, DM to Recover or Hack accounts and missing phones. #gmailhack#gmaildown #hacked #Hacking #hackaccount #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX -- ASTRA_cyberhack
Recover locked/lost accounts with ease.DM me for all account retrievals.#gmailhack #gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware -- ASTRA_cyberhack
All social media accounts hacking, Infiltration and recovery.#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #hacked #coinbasesupport #walletphrase -- ASTRA_cyberhack
PLDT, Smart block more than 13 million SMShing messages to combat ‘hijack profile’ incidents dlvr.it/T5fQjf #News #Phishing #pldt Click photo to read -- BenteUnodotcom
Explore 7️⃣ common mistakes hindering your #SMB #cybersecurity strategy and discover actionable insights to fortify your defenses: cs.co/6012wuGDr -- Cisco
At #BHAsia, Cisco Security & @Meraki are the official Mobile Device Management, #Malware Analysis, & #DNS Provider. 🛡️Visit the #NOC and attend a presentation to learn more about protecting the network: cs.co/6012bHsan@ThousandEyes @BlackHatEvents -- CiscoSecure
DM for fast and reliable hacking services. #Cybersecurity #Analytics #Al #lloT#Python #RStats #TensorFlow #Reactjs#CloudComputing #Serverless#DataScientist #Linux #100DaysofCode#NodeJS #golang #loT #Blockchain#Bitcoin   #Binanc3 -- CYBER_CAS
Send Me A DM for all digital hacking#MachineLearning #DataScience #SQL#Cybersecurity #BigData #Analytics #Al #lloT #Python #JavaScript #ReactJS#CloudComputing #Serverless#DataScientist #Linux #Programming #Coding #100DaysofCode #NodeJS #golang #NLP #GitHu -- CYBER_CAS
If your account is Hacked or being tampered with all you need is a Good hacker,Inbox now for all Hacking Services.#Hacked #icloud #snapchat #Discord#Roblox #missingphone #privacy#CyberSecurity #cyberattack #Linux#MachineLearning #DataScience#DataAnalytics -- CYBER_CAS
Hacking is way Easier when you contact the right hacker.Inbox me now for all hacking services. #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #hacking #xboxshare #robloxseries #Instagram #Discord#100DaysOfHacking #100DaysOfCode -- CYBER_CAS
Hacking is way Easier when you contact the right hacker.Inbox me now for all hacking services. #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #hacking #xboxshare #robloxseries #Instagram #Discord#100DaysOfHacking #100DaysOfCode -- CYBER_CAS
Dive deep into protecting Australia's critical infrastructure with our expert panel discussion at the Australian Cyber Security Summit.Book your tickets now!bit.ly/3uHb0e5#AustralianCyberSecuritySummit #technology #cybersecurity #defence #information #IT -- cyberdailyau
⚠️ONION SEARCH ENGINE⚠️This is 'haystak' another onion that allows you to explore and navigate hidden onions on the Dark Web.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT #InfosecHave an Onion: haystak5njsmn2hqkewe -- DarkWebInformer
⚠️THE TOR TIMES⚠️This is 'The Tor Times' it was once heavily updated with news from the Dark Web, not so much anymore, but still a GREAT resource.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT #InfosecHave an Onion: -- DarkWebInformer
2024/4/18 09:00なぜか東京電力の支払い詐欺に繋がる #迷惑メール ですねメール本文内リンクにアクセスしないようご注意くださいSubject:MasterCardカード:不正使用疑惑のセキュリティチェック#フィッシングメール #Phishing #詐欺メール #インターネット詐欺#TEPCO #東京電力 #MasterCard -- enagatofu
I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level. #llm #python #threatintel👉 code: github.com/mrwadams/attackge…👉 app: -- fr0gger_
SquareX enables employees to use their browser fearlessly with isolation tools that keep potential threats away from their work device!#cybersecurity -- getsquarex
Cuidado: los “trucos” en los videojuegos pueden esconder grandes problemas de ciberseguridad buff.ly/4aWybR9 #CyberSecurity -- josemiguelnovoa
#Phishing #警視庁 hxxps://soshikihanzaitaisakubumon.cohxxps://naibushimeitehai.cohxxps://tokubetsusosatai.cohxxps://rengososahan.cohxxps://keishicho.co(AS13335 - CLOUDFLARENET) -- KesaGataMe0
#Phishing #ekinet #えきねっと IP:91.204.226.175(AS 205960 / Hdtidc Limited )hxxps://www.huanshijiaoyu.comhxxps://www.jifuxinxi.comhxxps://www.jxdzvip.comhxxps://www.jzlzsgc.comhxxps://www.maomaoyaya.comhxxps://www.mgsxgpl.com -- KesaGataMe0
#Phishing #SMBC #SMCC #三井住友カード IP:103.157.142.89(AS 137443 / ChangLian Network Technology Co., Limited )hxxps://e0dkfa.cnhxxps://el6v0a.cnhxxps://erdvoxd.cnhxxps://erp0lb.cnhxxps://es65yb.cnhxxps://f1ct0a.cnhxxps://fjun4a.cnhxxps://fs7xea.cnhxxps://fsfjdr -- KesaGataMe0
"United Nations Security Council References SlowMist’s Expert Analysis in Recent Report" published by Slowmist. #Cryptocurrency, #Trend, #CTI, #OSINT, #LAZARUS slowmist.medium.com/united-n… -- lazarusholic
"APT43 배후의 다단계 드롭박스 명령과 TutorialRAT" published by Genians. #APT43, #TutorialRAT, #LNK, #CTI, #OSINT, #LAZARUS genians.co.kr/blog/threat_in… -- lazarusholic
Released daily report on our blog2024-04-17 Daily Phishing URL Summarynoladefense.net/2024/04/2024…#phishing #scam #infosec #フィッシング詐欺 -- noladefense
@rockygiglio, Dir. of Security GTM and Solutions at SADA, recently applauded @PaloAltoNtwks's new platform strategy. Simplifying cybersecurity solutions is a "huge win for partners. #PaloAltoNetworks #Cybersecurity #SADA #security READ MORE: ow.ly/LqqE50R -- SADA
Now DM restore all social and personal accounts. #Gmailhack #hacked #Hacking #hackaccount #hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #Lockedaccount #metamask #hacked #icloud #missingphone #phishing #Phish #Hackedgmail #Hacked #Hackingti -- shawcracks
Text me now for any hacking or bypass Active 24/7#anyomous#sadapwhatsapphack #hackinstagrammurah#facebook #hackerstayaway #hackingout#accounthacking #mobilehacking #hackgmail#hacksnapchat #blackhathacker #hackerindia #phishing #Phish #Hackedgmail -- shawcracks
I retrieve all Hacked Snapchat inbox now for guide on how to recover your Account#hacking #snapchatdown #5G #icloud #SNAPCHATLEAKED#phishing #Phish #Hackedgmail #hackedinstagram -- shawcracks
app to get hacked ,text me now if you want to get any Snapchat account hacked #hacked #snapchat #snapchatdown #snapchatleak #hackaccount #hackingtime#phishing #phish #hackedinstagram #Hackingtime #Hacked -- shawcracks
As a Cyber security, hacking is easy, DM to Recover or Hack accounts and missing phones. #gmailhack#gmaildown #hacked #Hacking #hackaccount #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX -- shawcracks
DM for quick recovery.Available 24/7.#gmailhack#gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #RansomwareGroup#phishing #Phish #Hackedgmail #Hacked #Hackingtime #hackedinstagr -- shawcracks
Offering the best hacking, infiltration and recovery services on all social media accounts. #NFT#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #coinbasesupport #walletphrase -- shawcracks
#HackingLost your account and need a recovery but don't know how? All you need is a hacker to do the job?Inbox me for help on how to recover your account with immediate effect.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport -- shawcracks
Now DM restore all social and personal accounts. #Gmailhack #hacked #Hacking #hackaccount #hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #Lockedaccount #metamask #hacked #icloud #missingphone #phishing #Phish #Hackedgmail #Hacked #Hackingti -- shawcracks
If it was up to you, to help one young woman chase her dreams of a career in #cybersecurity, would you make that happen with your donation?We need your support to turn the potential of 500 young women across Africa into today's cyber talent and tomorrow's -- sisinerdtweets
AI is making #smartdevices – watches, speakers, doorbells – easier to #hack. Here’s how to stay #safetheconversation.com/ai-is-ma… #fintech #cybersecurity #AI #ArtificialIntelligence #MachineLearning @RMIT @ConversationEDU @mclynd @ChuckDBrooks @ScottBVS -- SpirosMargaris
SAS Introduces Industry-Specific AI Models to Enhance Business Solutions ift.tt/QNyxHM3Get the latest #technology #electricvehicles #apple #iphone #samsung #galaxy #ai #openai #nvidia #space #robotics #cybersecurity and #gaming news on NEWSLINKER! -- thenewslinker
Ever faced a 'We're sorry... access denied' message online? It's all about protecting you and the service from automated threats. #Cybersecurity #TechSafetynews.google.com/rss/articles… -- TrendCryptBlock
Que lindo cuando te llaman para dar una capacitación de #ciberseguridad en otro país y te pagan todo, pero Justo Un Miércoles (el próximo) no puedes. 🥲🥲🥲JUM, se llama nuestro equipo de fútbol, queda validado el nombre.#CyberSecurity -- walterfaguero
YouTube is all messed up right now. Whole account basically wiped out. All my subscriptions gone.Either a major glitch or worse cyberattack.#cyberattack #cybersecurity #YouTube -- co_in_ci_dence
Keeping #Cybersecurity within focus as economic pressures take hold ow.ly/YsQN50RhaxA #Technology -- Cybersecinsider
⚠️#BREAKING Allegedly, #Akira has named a new victim.#Ransomware #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Malware #Infosec #CTICountry: #USA🇺🇸Threat Actor: AkiraCompany: Lotz TruckingIndustry: TransportationRevenue: $17.1MData Am -- DarkWebInformer
⚠️ONION⚠️This is 'Pitch'. It's a Twitter/X style of site where you can find a lot of Threat actors on the Dark Web and even more information. Onion is in the sub-post.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #OSINT #Infosec -- DarkWebInformer
Jordan has been under a relentless cyber attack for the past two days. The latest targets of the hacktivist group, The Anonymous BD, include: 🔒1. Ministry of Industry and Trade 2. Ministry of Environment 3. Royal Jordanian Airforce #Cyberattack #Jordan #I -- FalconFeedsio
Pic of the Day#infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity -- hackinarticles
Quer saber como #Recuperar, #hackear, recuperar ou proteger quaisquer contas ou carteiras DM agora #CyberSecurity #hacker #infosec @tech #opensource #crime #gdpr #cloud#cloudsecurity #dataprotection#Privacidade #cloudcomputing #malware #ransomware#100Days -- howord_chatles
【SecurityNext】Oracle、「Java SE」に関する脆弱性13件を修正 #cybersecurity #security #news security-next.com/156078 -- IT_security_bot
#Phishing #MUFG #三菱UFJ銀行 IP:103.158.37.203(AS 142032 / High Family Technology Co., Limited )hxxps://www.kmandaa.comhxxps://www.yfc275.comhxxps://www.zkp56.comhxxps://www.rah46.comhxxps://www.rpz73.comhxxps://www.gyw13.comhxxps://www.vhd41.com -- KesaGataMe0
#Phishing #Apple #AppleID IP:69.176.95.36(AS 64050 / BGPNET Global ASN )hxxps://idapesyl.cchxxps://apidesyw.cc -- KesaGataMe0
Secure Your Business: 2024 Backup & Data Recovery Tactics▸ lttr.ai/AReBQ#databackup #datarecovery #cybersecurity #businesscontinuity #ransomwareprotection #iFeelTech -- NandorKatai
maneiras estranhas pelas quais os funcionários podem (acidentalmente) expor dados  #Segurança de Dados #100DaysOfCodd#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #LaCasaDeLosFamososMx #Relacionamen -- net_spyspouse
maneiras estranhas pelas quais os funcionários podem (acidentalmente) expor dados  #Segurança de Dados #100DaysOfCodd#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #LaCasaDeLosFamososMx #Relacionamen -- net_spyspouse
Estoy disponible 24/78Recibido#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld #CDMX #NL -- net_spyspouse
Estoy disponible 24/78Recibido#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld #CDMX #NL -- net_spyspouse
Cloud-Based Identity to Exfiltration Attack github.com/LearningKijo/Secu… #Pentesting #CyberSecurity #Infosec -- ptracesecurity
U.S. intelligence on high alert ever since Russian subs were caught red-handed near undersea cables in the North Atlantic in 2019 attempting to tap into data transmitted through them, compromise communications and gather sensitive intel.msn.com/en-us/news -- Robert4787
Sentinel Automation Part 1: Enriching Sentinel Incidents with KQL Results kqlquery.com/posts/sentinel-…#MicrosoftSentinel #Cybersecurity #MicrosoftSecurity #Security #DefenderXDR #MustLearnKQL #KQL -- rodtrent
--> %2Fspecs[.]openid[.]net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs[.]openid[.]net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin#phishing#フィッシング詐欺#Mastercard#マスターカード -- romonlyht
--> identifier&openid_return_to=https%3A%2F%2Fwww[.]amazon[.]co[.]jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F -->#phishing#フィッシング詐欺#Mastercard#マスターカ -- romonlyht
hxxp://ti6hga[.]cn/?index=509168.76.121.114redirecthxxps://ti6hga[.]cn/?index=509redirecthxxps://ti6hga[.]cn/signim/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs[.]openid[.]net%2Fauth%2F2.0%2F -->#phishing#フィッシング詐欺#Mastercard#マスターカード -- romonlyht
--> %2Fspecs[.]openid[.]net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs[.]openid[.]net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin#phishing#フィッシング詐欺#Mastercard#マスターカード -- romonlyht
--> identifier&openid_return_to=https%3A%2F%2Fwww[.]amazon[.]co[.]jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F -->#phishing#フィッシング詐欺#Mastercard#マスターカ -- romonlyht
hxxp://ti6hga[.]cn/?index=927168.76.121.114redirecthxxps://ti6hga[.]cn/?index=927redirecthxxps://ti6hga[.]cn/signim/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs[.]openid[.]net%2Fauth%2F2.0%2F -->#phishing#フィッシング詐欺#Mastercard#マスターカード -- romonlyht
hxxps://sba[.]yandex[.]ru/redirect?url=http%3A%2F%2Fti6hga[.]cn%3Findex%3D927&client=clck&request_id=1713319026474571-7290593462670626146&sign=420cbc8db05f29dbdee646c8ee91b64793.158.134.232redirect#phishing#フィッシング詐欺#Mastercard#マスターカード -- romonlyht
cc.uec.ac.jp/blogs/news/2024…No.1 (another link)Received: from 175.148.101.218; 03:58:07 +0900hxxps://clck[.]ru/3A7UT7213.180.204.221redirect#phishing#フィッシング詐欺#Mastercard#マスターカード -- romonlyht
Coppel caído#outage #down #ransomware -- spideymang
🚨 Alert - A critical #vulnerability in PuTTY versions 0.68 to 0.80 could lead to private key compromises.Details: thehackernews.com/2024/04/wi…Don't let hackers take control—update immediately.#cybersecurity #infosec -- TheHackersNews
🚨 Two individuals have been arrested for developing and distributing #Hive RAT #malware, while a Nebraska man has been indicted for a $3.5 million cloud cryptojacking scheme.thehackernews.com/2024/04/hi…#cryptocurrency #hacking -- YourAnonRiots