Hacker Trends
06/17
06/18
06/19
Statistic
10/22 22:30 (UTC)
06/17
06/18
06/19
8 Posts
VMware fixes critical vCenter RCE vulnerability, patch now
https://
www.bleepingcomputer.com
/news/security/vmware-fixes-critical-vcenter-rce-vulnerability-patch-now/
6 Posts
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
https://
blog.k3170makan.com
/2020/11/linux-kernel-exploitation-0x0-debugging.html
5 Posts
Google Bug Hunters - Google Bug Hunters
http://
bughunters.google.com
5 Posts
Fake Google Chrome errors trick you into running malicious PowerShell scripts
https://
www.bleepingcomputer.com
/news/security/fake-google-chrome-errors-trick-you-into-running-malicious-powershell-scripts/
4 Posts
https://
www.aon.com
/cyber-solutions/aon_cyber_labs/finding-more-idors-tips-and-tricks/
4 Posts
Everything You Need to Know About IDOR (Insecure Direct Object References) | by ayşe bilge gündüz | Medium
https://
medium.com
/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87
4 Posts
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
https://
thehackernews.com
/2024/06/cybercriminals-exploit-free-software.html
4 Posts
How to analyze main input file & its dependencies in a single IDA database - YouTube
https://
youtu.be
/paNBm7bvGtY
4 Posts
Mobile OAuth Attacks - iOS URL Scheme Hijacking Revamped :: Evan Connelly - Security Research Blog
https://
evanconnelly.github.io
/post/ios-oauth/
4 Posts
How quickly can attackers guess your password? | Securelist
https://
securelist.com
/passworde-brute-force-time/112984/
4 Posts
TROOPERS24
https://
troopers.de
/troopers24/agenda/
3 Posts
Surface UEFI: Evolution in boot, security & device management to build an industry leading secure PC - Microsoft Community Hub
https://
techcommunity.microsoft.com
/t5/surface-it-pro-blog/surface-uefi-evolution-in-boot-security-amp-device-management-to/ba-p/4159998
3 Posts
How Twitch Helper Can Be Used for Privilege Escalation
https://
blog.kandji.io
/twitch-privileged-helper
3 Posts
GitHub - YaS5in3/Bug-Bounty-Wordlists
https://
github.com
/YaS5in3/Bug-Bounty-Wordlists
3 Posts
Singapore Police Extradites Malaysians Linked to Android Malware Fraud
https://
thehackernews.com
/2024/06/singapore-police-extradites-malaysians.html
3 Posts
Edge services are extremely attractive targets to attackers - Help Net Security
https://
www.helpnetsecurity.com
/2024/06/18/vulnerable-software-mass-exploitation/
3 Posts
[2406.10016] Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions
https://
arxiv.org
/abs/2406.10016
3 Posts
Keytronic confirms data breach after ransomware attack
https://
securityaffairs.com
/164642/data-breach/keytronic-blackbasta-ransomware.html
3 Posts
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
https://
thehackernews.com
/2024/06/vmware-issues-patches-for-cloud.html
3 Posts
New BadSpace Backdoor Deployed in Drive-By Attacks - SecurityWeek
https://
www.securityweek.com
/new-badspace-backdoor-deployed-in-drive-by-attacks/
3 Posts
ONNX phishing service targets Microsoft 365 accounts at financial firms
https://
www.bleepingcomputer.com
/news/security/onnx-phishing-service-targets-microsoft-365-accounts-at-financial-firms/
3 Posts
Bug Bounty Programs, Hacking Contests Power China's Cyber Offense
https://
www.darkreading.com
/cybersecurity-operations/bug-bounty-programs-hacking-contests-power-chinas-cyber-offense
3 Posts
Forest Compromise Through AMA Abuse – Q&D Security
https://
blog.qdsecurity.se
/2024/04/07/forest-compromise-through-ama-abuse/
3 Posts
Support Content Notification - Support Portal - Broadcom support portal
https://
support.broadcom.com
/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
3 Posts
Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM
https://
thehackernews.com
/2024/06/signal-foundation-warns-against-eus.html