NEW CARDING CHAT IN TELEGRAM

vulnerabilities

  1. Man

    $1 million in 4 days: hackers turned vulnerabilities into gold

    The competitors set a record at Pwn2Own Ireland. The fourth day of the Pwn2Own Ireland 2024 competition ended with more than a million dollar prize money for discovering over 70 unique zero-day vulnerabilities in fully updated devices. During the competition, cybersecurity specialists checked...
  2. Man

    114 vulnerabilities in 3 days: who will be the winner of Pwn2Own 2024?

    White hackers are breaking the smart home and creating new banknotes. In Ireland, the third day of the Pwn2Own 2024 hacking competition continues, where white hat hackers have identified 11 new zero-day vulnerabilities. The prize pool of the event increased by $124,750 and reached $874,875...
  3. Man

    Public Challenge: Apple Opens Its Cloud AI to Hunt for Vulnerabilities

    Now anyone can look inside the system and test it for strength. Apple has introduced a Virtual Research Environment (VRE) for public access to the Private Cloud Compute (PCC) security test. In addition, the company has opened the source code of some key components for review by researchers to...
  4. Man

    7 teams, 52 vulnerabilities: how was the first day of Pwn2Own 2024

    White hat hackers caused the organizers losses of half a million dollars, and this is great news. The Pwn2Own 2024 contest has started in Ireland, and the first day has already brought impressive results. For 52 unique 0day vulnerabilities, participants received a total of $516,250. The leader...
  5. Man

    No More Vulnerabilities Hidden: AI Becomes a Cold-Blooded Hunter

    Vulnhuntr detects exploits faster than hackers create them. The new Vulnhuntr tool makes a breakthrough in finding vulnerabilities in open source projects. Developed by Protect AI, it uses the power of large language models (LLMs) to detect complex multi-stage vulnerabilities, including remote...
  6. Man

    Five Reasons to Start Paying White Hat Hackers for Vulnerabilities

    Against the backdrop of a constant increase in cyberattacks and a shortage of professional personnel in the field of information security, more and more organizations are coming to the need to launch bug bounty programs. Such programs allow attracting thousands of freelance security researchers...
  7. Man

    From Zero to N: Hackers Break the Record for the Speed of Exploitation of Vulnerabilities

    The statistics of 0Day attacks hide a real digital pandemic. Google Mandiant analysts warn of a new trend: hackers are increasingly discovering and exploiting zero-day vulnerabilities in software. Experts studied 138 vulnerabilities identified in 2023, which were actively used in real attacks...
  8. Man

    Splunk Enterprise: Analysis of 12 Remote Code Execution Vulnerabilities

    The vulnerabilities affect several of the company's popular products at once. Splunk, a leader in data analytics and monitoring, has disclosed 12 recent vulnerabilities in its Splunk Enterprise for Windows product that allow attackers to remotely execute code (RCE). On October 14, 2024, the...
  9. Man

    Seven Keys to Data: What Are the Most Fashionable Vulnerabilities for Cybercriminals

    Positive Technologies has compiled a digest of 7 trending mistakes that you need to pay attention to urgently. In September 2024, Positive Technologies specialists identified 7 key vulnerabilities that have become trending. Among them are security problems in Microsoft, Veeam, VMware, Roundcube...
  10. Friend

    66 vulnerabilities and half a world in the crosshairs: what is known about Flax Typhoon

    Botnet cyberattacks target routers and IoT devices from well-known manufacturers. Last week, the agencies of the Five Eyes alliance, which includes the United States, the United Kingdom, Canada, Australia and New Zealand, issued a joint warning about cyberattacks related to the People's...
  11. Friend

    ESET fixes vulnerabilities in Windows and macOS products

    The problems affected both home and corporate solutions. ESET has fixed two privilege escalation vulnerabilities in its products for Windows and macOS operating systems. These vulnerabilities allowed attackers to gain unauthorized access to system resources. The first vulnerability, with the...
  12. Friend

    5 Security Vulnerabilities Discovered in D-Link Hi-End Routers

    The company urges users to update their devices urgently. D-Link has fixed critical vulnerabilities in three popular wireless router models that could allow remote attackers to execute arbitrary code or gain access to devices using embedded credentials. Models that are in demand among users...
  13. Friend

    From Data Loss to Full Control: Top 6 Trending Vulnerabilities for August

    Microsoft and WordPress are at the epicenter of threats. In August 2024, Positive Technologies specialists identified six of the most dangerous vulnerabilities that require immediate elimination or compensatory measures. Five of these vulnerabilities were found in Microsoft products, and one...
  14. Friend

    79 Vulnerabilities and 4 0Day: Microsoft's Patch Tuesday

    On September Patch Tuesday, the company saved users from critical bugs. Microsoft released security updates as part of the September Patch Tuesday 2024 that address 79 vulnerabilities. Among them are 4 actively exploited (including 1 publicly disclosed) zero-day vulnerabilities. The update...
  15. Friend

    Zero-day Market: How Zero-Day Vulnerabilities Became the Most Valuable Commodity on the Darknet

    Who, why and how is engaged in the distribution of tools that can wipe out entire states from the face of the Earth? Have you ever wondered what it's like to be a hacker? In various movies and TV shows, we often see a hooded man hitting a keyboard, resulting in a lot of numbers and symbols...
  16. Friend

    Critical Vulnerabilities in MLOps: 20+ Attack Vectors on AI Models

    Researchers have found more than 20 weaknesses in machine learning platforms. Cybersecurity researchers warn of significant risks associated with vulnerabilities in the machine learning (ML) software supply chain. For example, more than 20 vulnerabilities have recently been identified in a...
  17. Friend

    Optimism Foundation disabled fraud protection due to vulnerabilities

    The Optimism Foundation returned the L2 network to a permissioned state after auditors identified vulnerabilities in the decentralized error proof mechanism. Introduced in early July, the permissionless Fault Proof solution allows users to challenge potentially fraudulent and incorrect...
  18. Friend

    US offers to study vulnerabilities of the Russian Astra Linux OS

    CFR believes that Russia has fewer opportunities to fully protect its software. The American analytical center of the United States from the Council on Foreign Relations (CFR), as part of a study of the level of import substitution in the Russian Federation, called for studying the level of...
  19. Friend

    BBOT updated: the new version speeds up the search for vulnerabilities tenfold

    YARA integration and optimization of DNS / HTTP engines significantly improved the tool's performance. On the eve of the DEF CON 32 conference, a new release of BBOT 2.0 was presented, which promises to significantly simplify the use of the tool and speed up the scanning process. BBOT (Bighuge...
  20. Friend

    From RCE to data leak: 10 vulnerabilities discovered in Google Quick Share

    Google and Samsung's new file sharing service may become a target for hackers. Google's Quick Share is a feature-rich utility for sharing data between Android, Windows, and Chrome OS devices. It uses a wide range of communication protocols, including Bluetooth, Wi-Fi, Wi-Fi Direct, WebRTC, and...
Top