Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

Backdoor.Win32.Symmi.qua MVID-2024-0692 Buffer Overflow

Backdoor.Win32.Symmi.qua malware suffers from a buffer overflow vulnerability.

Packet Storm
#vulnerability#web#mac#redis#backdoor#buffer_overflow#auth
HackTool.Win32.Freezer.br (WinSpy) MVID-2024-0691 Insecure Credential Storage

HackTool.Win32.Freezer.br (WinSpy) malware suffers from an insecure credential storage vulnerability.

Backdoor.Win32.Optix.02.b MVID-2024-0690 Hardcoded Credential

Backdoor.Win32.Optix.02.b malware suffers from a hardcoded credential vulnerability.

Backdoor.Win32.JustJoke.21 (BackDoor Pro - v2.0b4) MVID-2024-0689 Code Execution

Backdoor.Win32.JustJoke.21 (BackDoor Pro - v2.0b4) malware suffers from a code execution vulnerability.

Backdoor.Win32.PoisonIvy.ymw MVID-2024-0688 Insecure Credential Storage

Backdoor.Win32.PoisonIvy.ymw malware suffers from an insecure credential storage vulnerability.

Online Travel Agency System 1.0 Shell Upload

Online Travel Agency System version 1.0 suffers from a remote shell upload vulnerability.

Tourism Management System 1.0 SQL Injection

Tourism Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to Developers

A new supply chain attack technique targeting the Python Package Index (PyPI) registry has been exploited in the wild in an attempt to infiltrate downstream organizations. It has been codenamed Revival Hijack by software supply chain security firm JFrog, which said the attack method could be used to hijack 22,000 existing PyPI packages and result in "hundreds of thousands" of malicious package

Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers

Zyxel has released software updates to address a critical security flaw impacting certain access point (AP) and security router versions that could result in the execution of unauthorized commands. Tracked as CVE-2024-7261 (CVSS score: 9.8), the vulnerability has been described as a case of operating system (OS) command injection. "The improper neutralization of special elements in the

The New Effective Way to Prevent Account Takeovers

Account takeover attacks have emerged as one of the most persistent and damaging threats to cloud-based SaaS environments. Yet despite significant investments in traditional security measures, many organizations continue to struggle with preventing these attacks. A new report, "Why Account Takeover Attacks Still Succeed, and Why the Browser is Your Secret Weapon in Stopping Them" argues that the