July 9, 2024 at 09:30PM

BlastRADIUS Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack. https://www.helpnetsecurity.com/2024/07/09/blastradius-radius-protocol-vulnerability/ https://t.me/cKure/14376

July 9, 2024 at 05:45PM

■■□□□ Government in Pakistan authorises ISI (secret service) to trace, intercept calls, messages in a privacy violation law by state. https://www.geo.tv/latest/553339-govt-empowers-isi-to-intercept-trace-calls-after-cabinets-approval https://t.me/cKure/14375

July 9, 2024 at 01:31PM

■■□□□ Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation. https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html https://t.me/cKure/14374

July 9, 2024 at 02:29AM

■■■■□ RCE bug in widely used Ghostscript library now exploited in attacks. https://www.bleepingcomputer.com/news/security/rce-bug-in-widely-used-ghostscript-library-now-exploited-in-attacks/ https://t.me/cKure/14372

July 9, 2024 at 12:01AM

■■■■□ Solar 4RAYS threat intel team uncovers a new APT group “Lifting Zmiy” (eng. Lifting Serpent) that targets government organizations in Russia and Eastern Europe. The group hosted their C2 infrastructure on compromised servers, which were used in SCADA networks. https://rt-solar.ru/solar-4rays/blog/4506/ https://t.me/cKure/14371

July 7, 2024 at 06:05PM

■■■■□ How CVE-2022-24785 MomentJS Path Traversal Works: Detailed Exploit Guide. https://0xjay.com/how-cve-2022-24785-momentjs-path-traversal-works-detailed-exploit-guide https://t.me/cKure/14369