Multiple command execution vulnerabilities exist in the nas.cgi add_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the disk_part POST parameter.

Security Links is a curated list of websites for cybersecurity. Find cutting edge information and trends.

LATEST NEWS
thumb
2025-01-14 16:54:02How to Eliminate “Shadow AI” in Software Development

With a security-first culture fully in play, developers will view the protected deployment of AI as a marketable skill, and respond accordingly. The post How to Eliminate “Shadow AI” in Software Development appeared first on SecurityWeek.

by SecurityWeek

PICKUP

A site for sharing packet capture (pcap) files and malware samples. I started this blog in 2013 to share pcaps and malware samples. Due to issues with Google, I've had to take most all blog posts downfrom 2013 through 2018, and I've been slowly restoring these pages using a new pattern for the password-portected zip archives.

ProPublica is an independent, non-profit newsroom that produces investigative journalism in the public interest.

Welcome to Pentesting Tactics – your go-to comprehensive reference guide for conducting thorough penetration testing, tailored for both newcomers and seasoned experts in the field. Our content is carefully curated to guide you directly to the crucial insights and strategies you need, spanning a wide range of pentesting areas. From diving deep into the intricacies of service and protocol pentesting to unraveling the complexities of web vulnerabilities, we provide comprehensive coverage.

Cyber Security Review promotes dialogue and provides a platform for information exchange and cooperation between stakeholders, industry, academia and cyber security experts worldwide, CSR helps to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.

A huge chunk of my personal notes since I started playing CTFs and working as a red teamer. These are living documents and I updated or add to them relatively often.

Stay informed on the latest in cyber threats, threat research, cyber risk and strategy. Read eSentire blog to learn how to become cyber resilient.

Weakpass collection of tools for bruteforce and hashcracking.

OSINT, Leaks, Breaches, Accounts, Networks and More.

RECENTLY ADDED
NEW

A gamified platform for defenders to practice their skills in security investigations and challenges covering; Incident Response, Digital Forensics, Security Operations, Reverse Engineering, and Threat Hunting. Free and paid tiers available.

NEW

Your Anti-Scam Partner, Keeping You Safe! Quick check for scams, and report scams with a single click to help protect others.

NEW

Software and Application Security Blog. Get expert insights from the Black Duck software and application security blog. Explore topics from DevOps security, software news, analysis, intel and more.

NEW

Hacking the cloud is an encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure. The goal is to share this knowledge with the security community to better defend cloud native technologies.

NEW

The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.

NEW

Traceable's blog offers the latest news in API security, risk reduction, and attack protection from industry experts.

NEW

Hacking techniques and research. Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.

NEW

Leading provider of SSL/TLS certificates, automated certificate management and website security solutions. Trusted by the world’s largest brands for 20+ years.

NEW

The Latest on VPNs, Privacy, Censorship. See what's happening now in the world of cybersecurity and online privacy. Get your news from a reliable, trustworthy group of cybersecurity experts.

NEW

The SecOps Automation Blog. Practical tips & threat analysis from Intezer's Research Team. Product news. Industry insights on the evolution of security operations, automation, and AI.

NEW

Analyze and share malware samples and threat intelligence to join the fight against cyber threats.

Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a file and based on analysis results can warn users against malware undetected by classic Anti-Virus products.

Government Technology has IT articles for state, local and city government. Find government news and events.