Tag
#auth
Backdoor.Win32.Symmi.qua malware suffers from a buffer overflow vulnerability.
HackTool.Win32.Freezer.br (WinSpy) malware suffers from an insecure credential storage vulnerability.
Backdoor.Win32.Optix.02.b malware suffers from a hardcoded credential vulnerability.
Backdoor.Win32.JustJoke.21 (BackDoor Pro - v2.0b4) malware suffers from a code execution vulnerability.
Backdoor.Win32.PoisonIvy.ymw malware suffers from an insecure credential storage vulnerability.
Online Travel Agency System version 1.0 suffers from a remote shell upload vulnerability.
Tourism Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
A new supply chain attack technique targeting the Python Package Index (PyPI) registry has been exploited in the wild in an attempt to infiltrate downstream organizations. It has been codenamed Revival Hijack by software supply chain security firm JFrog, which said the attack method could be used to hijack 22,000 existing PyPI packages and result in "hundreds of thousands" of malicious package
Zyxel has released software updates to address a critical security flaw impacting certain access point (AP) and security router versions that could result in the execution of unauthorized commands. Tracked as CVE-2024-7261 (CVSS score: 9.8), the vulnerability has been described as a case of operating system (OS) command injection. "The improper neutralization of special elements in the
Account takeover attacks have emerged as one of the most persistent and damaging threats to cloud-based SaaS environments. Yet despite significant investments in traditional security measures, many organizations continue to struggle with preventing these attacks. A new report, "Why Account Takeover Attacks Still Succeed, and Why the Browser is Your Secret Weapon in Stopping Them" argues that the