Latest CyberSec News by @thecyberpicker

Latest CyberSec News by @thecyberpicker

31198 bookmarks
Custom sorting
Typecho 1.3.0 - Race Condition
Typecho 1.3.0 - Race Condition
Typecho 1.3.0 - Race Condition. CVE-2024-35539 . webapps exploit for PHP platform
·exploit-db.com·
Typecho 1.3.0 - Race Condition
Cosy+ firmware 21.2s7 - Command Injection
Cosy+ firmware 21.2s7 - Command Injection
Cosy+ firmware 21.2s7 - Command Injection. CVE-2024-33896 . hardware exploit for Multiple platform
·exploit-db.com·
Cosy+ firmware 21.2s7 - Command Injection
PandoraFMS 7.0NG.772 - SQL Injection
PandoraFMS 7.0NG.772 - SQL Injection
PandoraFMS 7.0NG.772 - SQL Injection. CVE-2023-44088 . webapps exploit for PHP platform
·exploit-db.com·
PandoraFMS 7.0NG.772 - SQL Injection
Feng Office 3.11.1.2 - SQL Injection
Feng Office 3.11.1.2 - SQL Injection
Feng Office 3.11.1.2 - SQL Injection. CVE-2024-6039 . webapps exploit for PHP platform
·exploit-db.com·
Feng Office 3.11.1.2 - SQL Injection
Les hackers nord-coréens tentent de dérober des cryptomonnaies avec de fausses annonces d’embauche
Les hackers nord-coréens tentent de dérober des cryptomonnaies avec de fausses annonces d’embauche
Les pirates de la Corée du Nord mènent une nouvelle campagne pour piéger des employés travaillant pour des entreprises du secteur des cryptomonnaies. De fausses annonces d'embauche incitent les cibles à postuler et à installer un logiciel malveillant. Les hackers nord-coréens continuent de chasser les employés de la
·numerama.com·
Les hackers nord-coréens tentent de dérober des cryptomonnaies avec de fausses annonces d’embauche
Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
A targeted campaign exploited Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances to extract EC2 Metadata, which could include Identity and Access Management (IAM) credentials from the IMDSv1 endpoint.
·bleepingcomputer.com·
Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
FFIEC CAT Sunset: What You Need to Know
FFIEC CAT Sunset: What You Need to Know
How are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change.
·cisecurity.org·
FFIEC CAT Sunset: What You Need to Know
CIS Benchmarks April 2025 Update
CIS Benchmarks April 2025 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for April 2025.
·cisecurity.org·
CIS Benchmarks April 2025 Update
Windows 11 April update unexpectedly creates new 'inetpub' folder
Windows 11 April update unexpectedly creates new 'inetpub' folder
Microsoft's April 2025 Patch Tuesday updates are strangely creating an empty "inetpub" folder in the root of the C:\ drive, even on systems that do not have Internet Information Services (IIS) installed.
·bleepingcomputer.com·
Windows 11 April update unexpectedly creates new 'inetpub' folder
Oracle says "obsolete servers" hacked, denies cloud breach
Oracle says "obsolete servers" hacked, denies cloud breach
Oracle finally confirmed in email notifications sent to customers that a hacker stole and leaked credentials that were stolen from what it described as "two obsolete servers."
·bleepingcomputer.com·
Oracle says "obsolete servers" hacked, denies cloud breach
Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI
Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI
Exchange Server and SharePoint Server are business-critical assets and considered crown-jewels for many organizations, making them attractive targets for attacks. To help customers protect their environments and respond to these attacks, Exchange Server and SharePoint Server integrated Windows Antimalware Scan Interface (AMSI), providing an essential layer of protection by preventing harmful web requests from reaching backend endpoints. The blog outlines several attacks prevented by AMSI integration and highlights recent enhancements. The blog also provides protection and mitigation guidance and how defenders can respond.
·microsoft.com·
Stopping attacks against on-premises Exchange Server and SharePoint Server with AMSI
How cyberattackers exploit domain controllers using ransomware
How cyberattackers exploit domain controllers using ransomware
Cyberattackers exploit domain controllers to gain privileged system access where they deploy ransomware that causes widespread damage and operational disruption.
·microsoft.com·
How cyberattackers exploit domain controllers using ransomware
Rights group calls on Thai government to end alleged cyberattacks against civil society
Rights group calls on Thai government to end alleged cyberattacks against civil society
Human rights non-profit Amnesty International urged Thai authorities this week to investigate claims of state-sponsored cyberattacks against human rights organizations and pro-democracy activists following the leak of internal government documents that detailed such an operation.
·therecord.media·
Rights group calls on Thai government to end alleged cyberattacks against civil society
News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises
News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises
Luxembourg, Luxembourg, Apr. 9, 2025, CyberNewswire -- Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super Transit, a cutting-edge DDoS protection and acceleration feature, designed to safeguard enterprise infrastructure while delivering lightning-fast connectivity. This comes as organizations face a 56% year-on-year increase in high-volume, complex DDoS attacks that disrupt operations,
·lastwatchdog.com·
News alert: Gcore launches Super Transit – accelerated DDoS protection to safeguard enterprises
Trends-To-Watch Q&A: The future of edge—will decentralization ever be more than a talking point?
Trends-To-Watch Q&A: The future of edge—will decentralization ever be more than a talking point?
For decades, a handful of tech giants have shaped digital infrastructure—and, with it, how businesses and governments manage data, security, and connectivity. Related: Practical uses for edge computing Now, the rise of distributed edge computing is being touted as a potential game-changer—pushing processing power closer to users, improving security, and redistributing control over digital assets.
·lastwatchdog.com·
Trends-To-Watch Q&A: The future of edge—will decentralization ever be more than a talking point?
Treasury Department bank regulator discloses major hack
Treasury Department bank regulator discloses major hack
Attackers gained unauthorized, prolonged access to the Office of the Comptroller of the Currency’s email system, accessing numerous emails containing highly sensitive regulatory data.
·cybersecuritydive.com·
Treasury Department bank regulator discloses major hack