Security
Headlines
HeadlinesLatestCVEs

Tag

#web

Pig Butchering: Fake Trading Apps Target Crypto on Apple, Google Play Stores

Pig Butchering scam targets crypto users with fake trading apps on Apple and Google Play Stores. Disguised as…

HackRead
#web#ios#android#apple#google#git#intel#sap
SeedDMS 6.0.28 Cross Site Scripting

SeedDMS version 6.0.28 suffers from a persistent cross site scripting vulnerability.

TitanNit Web Control 2.01 / Atemio 7600 Code Injection

TitanNit Web Control 2.01 and Atemio 7600 suffer from a PHP code injection vulnerability.

Task Management System 1.0 Code Injection

Task Management System version 1.0 suffers from a PHP code injection vulnerability.

Student Attendance Management System 1.0 Insecure Settings

Student Attendance Management System version 1.0 suffers from an ignored default credential vulnerability.

Alert: Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities

A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices. "These vulnerabilities could enable attackers to take control of a router by injecting malicious code, allowing them to persist on the device and use it as a gateway into enterprise networks," Forescout

Manufacturers Rank as Ransomware's Biggest Target

Improvements in cybersecurity and basics like patching aren't keeping pace with the manufacturing sector's rapid growth.

Alert: Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit

Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by exploiting a security vulnerability dubbed CosmicSting. Tracked as CVE-2024-34102 (CVSS score: 9.8), the critical flaw relates to an improper restriction of XML external entity reference (XXE) vulnerability that could result in remote code execution. The shortcoming,

5 Must-Have Tools for Effective Dynamic Malware Analysis

Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated environment of a malware sandbox to monitor its behavior and gather actionable indicators. Effective analysis must be fast, in-depth, and precise. These five tools will help you achieve it with ease. 1. Interactivity Having the ability to interact with the

GHSA-9mjw-79r6-c9m8: Portainer improperly uses an encryption algorithm in the AesEncrypt function

Portainer before 2.20.2 improperly uses an encryption algorithm in the `AesEncrypt` function.