Monday, December 23, 2024

Monthly Archives: January, 2022

A word from our sponsor

spot_img

WordPress Core 5.8.2 – ‘WP_Query’ SQL Injection [PoC]

# Exploit Title: WordPress Core 5.8.2 - 'WP_Query' SQL Injection # Date:...

Teen Security Specialist gains remote control of over 20 Teslas

Teen Gains Full control over car doors, security system, and more Facepalm: This week,...

How Cybercriminals Are Cashing in on a Culture of ‘Yes’

What is the culture of Yes? It's hard to say no. To...

Weakness In Microsoft Defender Allows Hackers To Bypass Malware Detection

Threat actors can take advantage of a weakness that affects Microsoft...

Orca Security Research Team Discovers AWS Zero-Day Vulnerability

The cloud environment relies on a few core principles. One of...

Ukrainian authorities arrest suspected ransomware ringleader

Police in Ukraine on Thursday said they broke up a ransomware...

Common methods hackers use to hide credential stuffing attacks

Cybercriminals adopt all sorts of tactics to disguise credential stuffing activity...

FBI: Malicious USB drives are being posted to businesses

Though the feds don't cite any specific threat, a joint advisory...

Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw

In this Tech Tip, SANS Institute’s Johannes Ullrich suggests using PowerShell...

Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell Backdoor

An Iranian state-sponsored actor has been observed scanning and attempting to...