Security
Headlines
HeadlinesLatestCVEs

Tag

#git

2023 Ransomware Attacks Up More Than 95% Over 2022, According to Corvus Insurance Q3 Report

DARKReading
#vulnerability#git#zero_day
Former NSA Employee Faces Life in Prison After Espionage Attempt

The ex-employee claimed that he believed the shared information would benefit Russia and harm the US.

The Evolution of Influencer Marketing in Manchester, UK

By Owais Sultan Dive into Manchester’s vibrant influencer marketing scene. Discover key strategies, leading influencer marketing agencies, and how brands are… This is a post from HackRead.com Read the original post: The Evolution of Influencer Marketing in Manchester, UK

GHSA-r2hw-74xv-4gqp: Nautobot vulnerable to exposure of hashed user passwords via REST API

### Impact In Nautobot 2.0.x, certain REST API endpoints, in combination with the `?depth=<N>` query parameter, can expose hashed user passwords as stored in the database to any authenticated user with access to these endpoints. > The passwords are *not* exposed in plaintext. > Nautobot 1.x is *not* affected by this vulnerability. Example: ``` GET /api/users/permissions/?depth=1 HTTP 200 OK API-Version: 2.0 Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS Content-Type: application/json Vary: Accept ``` ```json { "count": 1, "next": null, "previous": null, "results": [ { "id": "28ea85e4-5039-4389-94f1-9a3e1c787149", "object_type": "users.objectpermission", "display": "Run Job", "url": "http://localhost:8080/api/users/permissions/28ea85e4-5039-4389-94f1-9a3e1c787149/", "natural_slug": "run-job_28ea", "object_types": [ "extras.job" ], "name": ...

15 Best SaaS SEO Experts That Will Help You Dominate Online

By Owais Sultan Looking for a SaaS SEO consultant? We’ve rounded up the top 15 SaaS SEO experts you need to… This is a post from HackRead.com Read the original post: 15 Best SaaS SEO Experts That Will Help You Dominate Online

WordPress LiteSpeed Cache 5.6 Cross Site Scripting

WordPress LiteSpeed Cache plugin versions 5.6 and below suffer from a persistent cross site scripting vulnerability.

Cyberattacks on Kenya Drop in Third Quarter

National response team attributes reduction to a cyber workforce with better training.

VMWare Aria Operations For Networks SSH Private Key Exposure

VMWare Aria Operations for Networks (vRealize Network Insight) versions 6.0.0 through 6.10.0 do not randomize the SSH keys on virtual machine initialization. Since the key is easily retrievable, an attacker can use it to gain unauthorized remote access as the "support" (root) user.

Israeli-Hamas Conflict Spells Opportunity for Online Scammers

As the conflict in the Middle East rages, malicious actors look to exploit the situation with bogus charity sites encouraging donations.