9 posts were published in the last hour
- 19:2 : LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File
- 19:2 : 43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers
- 19:2 : Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024
- 19:2 : Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis
- 19:2 : CVE-2024-13059: Exploiting Path Traversal in AnythingLLM for Remote Code Execution
- 19:2 : Krebs throws himself on the grenade, resigns from SentinelOne after Trump revokes security clearances
- 19:2 : CSP FY: A Magecart Attack That Dodges Policy—and Makes a Joke While Doing It
- 18:32 : Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH
- 18:31 : How to help prevent hotlinking using referer checking, AWS WAF, and Amazon CloudFront