A vulnerability was found in code-projects Student Record System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument regno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Security Links is a curated list of websites for cybersecurity. Find cutting edge information and trends.

LATEST NEWS
thumb
2024-10-07 19:35:37Comcast and Truist Bank customers impacted by debt collector’s breach

A data breach at a US debt collection agency has led to the loss of data of some Comcast and Truist Bank customers.

by Malwarebytes Labs

PICKUP

This project is aimed at providing technical guides on various hacking topics. The most advanced topics are Active Directory and Web services. Other topics will be added. The ultimate goal is centralize all hacking techniques.

Scammers are ruthless, and that is why I am here. My channel is all about bringing awareness to this critical problem with humor and fun. We will learn a lot of things along the way and if I help one person through this, it will be worth it.

Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.

The Kubenomicon was born of a desire to understand more about Kubernetes from an offensive perspective. I found many great resources to aid in my journey, but I quickly realized.

Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.

Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc.

It provides a platform for the cybersecurity community to share news, commentary and resources—all in one place. We’re extremely proud to offer a highly visible platform to those who work within cybersecurity or aspire to do so. We work with IT security professionals from around the globe, maintaining The State of Security as a platform for them to share their voice.

Magazine, Website, Newsletter & Webinar service covering Cybersecurity, Network Security, Application Security, Operational security, and Technology & AI.

Blog from Bedrock. Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.

RECENTLY ADDED
NEW

Living Off the Orchard. macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes.

NEW

The repository tries to gather an information about Windows persistence mechanisms to make the protection/detection more efficient. Most of the information is well known for years, being actively used within various scenarios.

NEW

Vumetric Cyber portal is a public security news, threat indicators and CVE security vulnerability database/information source.

NEW

NetworkLessons.com offers a range of Networking courses, including Cisco CCNA, CCNP and CCIE Routing & Switching. You find an overview of all courses below.

NEW

Last 3 days of cybersecurity industry content aggregated for your analysts. ThreatABLE provides a vendor-agnostic roll-up of cyber threat intelligence to employees of organizations of any size. We aim to provide everyone from analysts to CISOs a one-stop-shop to sift through the gargantuan amounts of data that comes flooding into the industry every day.

NEW

CBT Nuggets is the best way to learn IT, our blog is the best way to learn about CBT Nuggets.

NEW

Discover the latest news and updates in secure coding and application security with SecureFlag.

NEW

Visit often to get the latest data protection news and information you can use in your fight against ransomware, malware, and other threats.

NEW

Follow the latest phishing trends by reading articles published by the CanIPhish team.

NEW

Welcome to our blog! You’ll find the best opt-out guides, in-depth privacy research, and privacy blog posts here. With the help of our experts, you’ll take the first steps towards taking control of your data privacy.

NEW

Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.

NEW

Interactive Kubernetes Security Learning Playground.

NEW

Learn OSINT for free by subscribing to our newsletter. Discover the best Open-Source Intelligence (OSINT) tools, techniques, and valuable resources.

NEW

Stay up to date with the latest cybersecurity insights, practical advice, articles and news from the Veriti Experts.