■■■■■ #Zeroday exploited in wild. Hackers actively exploiting a critical remote code execution vulnerability in the File Manager plugin, over 300,000 WordPress sites potentially exposed. https://securityaffairs.co/wordpress/107826/hacking/file-manager-wordpress-plugin-f#Zeroday exploited in wild. Hackers actively exploiting a critical remote code execution vulnerability in the File Manager plugin, over 300,000 WordPress sites potentially exposed. https://securityaffairs.co/wordpress/107826/hacking/file-manager-wordpress-plugFile Manager plugin, over 300,000 WordPress sites potentially exposed. https://securityaffairs.co/wordpress/107826/hacking/file-manager-wordpress-plugin-flaw.html https://t.me/cKure/5403
All posts tagged Cyber Security
September 2, 2020 at 11:43PM
■□□□□ Anubis Malware that Attacks Windows Users. https://www.ehackingnews.com/2020/09/anubis-malware-that-attacks-windows.html https://t.me/cKure/5402
September 2, 2020 at 11:24PM
■■■□□ #UnitedStates military's cyber warfare unit focuses on state actors of #Iran . Very funny that entire election campaign data is in public domain including private conversations of officials. https://mobile.twitter.com/CNMF_CyberAlert/status/1301219076384198656 https://t.me/cKure/5401
September 2, 2020 at 07:20PM
■■□□□ Stealing local files with Safari, Prototype pollution vs HTML sanitizers. https://blog.intigriti.com/2020/09/02/bug-bytes-86-stealing-local-files-with-safari-prototype-pollution-vs-html-sanitizers-a-hackers-mom-learning-bug-bounty/ https://t.me/cKure/5400
September 2, 2020 at 07:15PM
■■■□□ XSS bypass in cloudflare. <svg onload=alert%26%230000000040"")> &# = %26%230000000040 = ( https://t.me/cKure/5399
September 2, 2020 at 07:04PM
■■□□□ #Privacy breach at Amazon. https://www.vice.com/amp/en_us/article/3azegw/amazon-is-spying-on-its-workers-in-closed-facebook-groups-internal-reports-show https://t.me/cKure/5398
September 2, 2020 at 06:32PM
■■□□□ Attackers abuse Google DNS over HTTPS to download malware. https://www.bleepingcomputer.com/news/security/attackers-abuse-google-dns-over-https-to-download-malware/ https://t.me/cKure/5397
September 2, 2020 at 03:11PM
■■■ Send this link in the footer of bug bounty email or tweet. Will scare the management a bit. https://www.infosecurity-magazine.com:443/news/ceos-face-jail-time-iot-attacks-by/ https://t.me/cKure/5396
September 2, 2020 at 02:52PM
■■□□□ #privacy: Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks. https://threatpost.com/chinese-apt-sepulcher-malware-phishing-attacks/158871/ #Ch#privacy: Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks. https://threatpost.com/chinese-apt-sepulcher-malware-phishing-attacks/158871/ #China https://t.me/cKure/5395
September 2, 2020 at 01:47PM
■■■■■ CVE-2020-1350 [DNS RCE]'s exploit code with demo video. https://mp.weixin.qq.com/s?__biz=MzUyMDEyNTkwNA==&mid=2247484522&idx=1&sn=502839af26daa450f644488d75f42cc7&chksm=f9ee68d5ce99e1c37960b7909b5e5cc40f38c9b71711309ee679f0819c10218c1f411976ad6c&scene=126&sessionid=1598960570&key=7adf10a6617c6315506261e47c83d49da426185a83a97372680c51010cd9f8a9b7d827f8ce99f66a6a037a0e51e31792a56cebcaeb5dc0397f92e90c443832a945cc89d1d4fc750e1cd43c30783fc7f9e08c7694e22d7f0dc1bff61b42ff65d359c70b50ecbe5031962b57b47eda33f6e7a61941d4c2016c630eeeddbfe5840a&ascene=1&uin=MTE1NDEwMjc3NA%3D%3D&devicetype=Windows+10+x64&version=62090514&lang=en&exportkey=A9HOqRA5mpcUuAp59geFMeQ%3D&pass_ticket=C6B3Q%2FKQ1%2FUbGev7ZeEeTKkGew3nmNhXz3pU3Wex0luSd%2FRuu%2BJ716bUqCZs4JbG https://t.me/cKure/5393
