Details |
Website |
2024-09-27 |
18 |
|
|
Remote execution exploit chain in CUPS: Overview, detection, and remediation | Datadog Security Labs |
Details |
Website |
2024-09-25 |
0 |
|
|
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool |
Details |
Website |
2024-09-25 |
0 |
|
|
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool - RedPacket Security |
Details |
Website |
2024-09-25 |
1 |
|
|
SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks And Exploits - RedPacket Security |
Details |
Website |
2024-09-25 |
2 |
|
|
Best Ways to Protect Your Mobile Application Security and Ensure Long-Term Safety |
Details |
Website |
2024-09-25 |
1 |
|
|
Memory-Mapped Section Injection|Methods and Mitigation | Malware Development | Part 6 |
Details |
Website |
2024-09-25 |
0 |
|
|
Mobile App Penetration Testing in UAE: Safeguarding Your Applications with eShield IT Services |
Details |
Website |
2024-09-23 |
728 |
|
|
US-CERT Vulnerability Summary for the Week of September 16, 2024 - RedPacket Security |
Details |
Website |
2024-09-20 |
42 |
|
|
How to combat malicious scripts by deploying SOP, CORP, CORS, CORB, COEP, COOP, and SCP |
Details |
Website |
2024-09-19 |
0 |
|
|
Wordfence Intelligence Weekly WordPress Vulnerability Report (September 9, 2024 to September 15, 2024) |
Details |
Website |
2024-09-18 |
16 |
|
|
The Windows Security Journey — LSA Protection (Local Security Authority Protection) |
Details |
Website |
2024-09-18 |
19 |
|
|
SHIM Me What You Got: Manipulating Shim and Office for Code Injection |
Details |
Website |
2024-09-18 |
4 |
|
|
How API Security Protects Your Data |
Details |
Website |
2024-09-17 |
3 |
|
|
Linux malware development 2: find process ID by name. Simple C example |
Details |
Website |
2024-09-16 |
843 |
|
|
US-CERT Vulnerability Summary for the Week of September 9, 2024 - RedPacket Security |
Details |
Website |
2024-09-16 |
1 |
|
|
Code Security |
Details |
Website |
2024-09-12 |
1 |
|
|
Cybersecurity Alert: Python Libraries Exploited for Malicious Intent |
Details |
Website |
2024-09-12 |
1 |
|
|
Web3 Security Compliance: A Complete Guide |
Details |
Website |
2024-09-12 |
0 |
|
|
Wordfence Intelligence Weekly WordPress Vulnerability Report (September 2, 2024 to September 8, 2024) |
Details |
Website |
2024-09-12 |
1 |
|
|
Cyber Briefing: 2024.09.12 |
Details |
Website |
2024-09-12 |
17 |
|
|
GitLab Issues Critical Patch Releases: Versions 17.3.2, 17.2.5, and 17.1.7 Address Key Vulnerabilities |
Details |
Website |
2024-09-11 |
2 |
|
|
Hold – Verify – Execute: Rise of malicious POCs targeting security researchers - Cybersecurity Insiders |
Details |
Website |
2024-09-11 |
18 |
|
|
ModSecurity + SafeLine WAF for Multi-layer Defense (1) |
Details |
Website |
2024-09-11 |
3 |
|
|
Python Libraries Used for Malicious Purposes - SANS Internet Storm Center |
Details |
Website |
2024-09-10 |
4 |
|
|
Understanding Different Techniques for Vulnerability Prioritization |