unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
CVE-2024-36680: SQL Injection Vulnerability in Facebook’s PrestaShop Module Exposes Thousands of E-commerce Sites to Credit Card Fraud
SQL Injection Exposure in Promokit.eu Threatens Facebook's PrestaShop Customers PrestaSho...
2024-6-27 06:45:21 | 阅读: 37 |
收藏
|
Wallarm Blog - lab.wallarm.com
prestashop
promokit
facebook
pkfacebook
php
CVE-2024-3080: ASUS warns Customers about the latest Authentication Bypass Vulnerability detected Across seven Router Models
ASUS announces major Firmware UpdateASUS recently issued a firmware update to resolve a criti...
2024-6-22 01:13:45 | 阅读: 25 |
收藏
|
Wallarm Blog - lab.wallarm.com
asus
network
firmware
routers
attackers
PCI DSS v4.0: What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments
On March 31st, 2024, The Payments Card Industry Standards Security Council (PCI SSC) official...
2024-6-20 22:3:22 | 阅读: 12 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
software
requirement
dss
Zero-Day Marketplace Explained: How Zerodium, BugTraq, and Fear contributed to the Rise of the Zero-Day Vulnerability Black Market
Whenever a company is notified about or discovers a critical flaw in their system/application...
2024-6-18 04:33:54 | 阅读: 29 |
收藏
|
Wallarm Blog - lab.wallarm.com
software
bugtraq
mailing
CVE-2024-29849: Veeam discloses Critical Vulnerability that allows attackers to bypass user authentication on its Backup Enterprise Manager web interface
On May 21, 2024, Veeam revealed a severe flaw across its Veeam Backup Enterprise Manager (VBEM...
2024-6-11 00:52:29 | 阅读: 34 |
收藏
|
Wallarm Blog - lab.wallarm.com
veeam
backup
attacker
29849
sso
CVE-2024-24919: Check Point’s Quantum Gateway comes under Attack as Hackers exploit Zero-Day Vulnerability
Active Exploits target Check Point Security Gateway Zero-Day Information Disclosure flawCheck...
2024-6-3 19:10:13 | 阅读: 24 |
收藏
|
Wallarm Blog - lab.wallarm.com
24919
security
remote
attackers
r81
Vulnerabilities in BIG-IP Next Central Manager allows control of managed devices
IntroductionIn May 2024, new vulnerabilities have been identified in BIG-IP Next Central Mana...
2024-5-22 00:56:30 | 阅读: 13 |
收藏
|
Wallarm Blog - lab.wallarm.com
attacker
injection
odata
security
Dell Data Breach: Personal Information of 49 Million Customers Compromised due to latest API Abuse
Dell recently issued a notice regarding a data breach that occurred on May 9, which has report...
2024-5-20 22:44:6 | 阅读: 14 |
收藏
|
Wallarm Blog - lab.wallarm.com
dell
menelik
security
notebooks
desktops
Best API Security Product: Wallarm wins 2024 Cybersecurity Excellence Award
We are thrilled to announce that Wallarm has clinched the sought-after 2024 Cybersecurity Exce...
2024-5-8 09:13:9 | 阅读: 9 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
resilience
award
Tracking CVE-2024-2876: Why does the latest WordPress exploit compromise over 90,000 websites?
A highly concerning security loophole was recently discovered in a WordPress plugin called "Em...
2024-5-6 19:11:50 | 阅读: 40 |
收藏
|
Wallarm Blog - lab.wallarm.com
wordpress
wallarm
subscribers
waap
27956
Introducing the Wallarm Q1 2024 API ThreatStats™ Report
As we have in previous editions of the ThreatStats report, we highlight the industry’s top API...
2024-4-30 23:2:12 | 阅读: 12 |
收藏
|
Wallarm Blog - lab.wallarm.com
threats
software
threatstats
sdlc
Wallarm’s Open Source API Firewall debuts at Blackhat Asia 2024 – Introduces Key New Features & Functionalities
Wallarm introduced its ongoing Open Source API Firewall project to the world at the recently c...
2024-4-22 20:47:25 | 阅读: 10 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
preventing
denylist
openapi
How to track and stop CVE-2024-3400: Palo Alto Devices API Exploit Causing Critical Infrastructure and Enterprise Epidemics
A severe command injection vulnerability in the GlobalProtect Gateway feature of PAN-OS versio...
2024-4-14 05:57:47 | 阅读: 102 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
3400
wallarm
pan
Top 3 API Leaks Identified by Cybersecurity & InfoSec Experts
APIs (Application Programming Interfaces) have proliferated widely, which increases their susc...
2024-4-8 23:21:4 | 阅读: 12 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
exposure
development
addressing
Spoutible Enhances Platform Security through Partnership with Wallarm
Spoutible, the rapidly growing social media platform known for its commitment to fostering a...
2024-3-26 23:23:19 | 阅读: 20 |
收藏
|
Wallarm Blog - lab.wallarm.com
spoutible
security
wallarm
partnership
commitment
Protected: Top 4 Industries at Risk of Credential Stuffing and Account Takeover (ATO) attacks
Wallarm — API Security — Protected: Top 4 Industries at Risk of Credential Stuffing and Acco...
2024-3-26 02:15:0 | 阅读: 13 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
wallarm
csf
industries
stuffing
Top 5 Data Breaches That Cost Millions
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using...
2024-3-18 23:0:11 | 阅读: 14 |
收藏
|
Wallarm Blog - lab.wallarm.com
mgm
microsoft
american
ransomware
Top 6 Data Breaches That Cost Millions
“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using...
2024-3-18 23:0:11 | 阅读: 11 |
收藏
|
Wallarm Blog - lab.wallarm.com
mgm
american
ransomware
security
Test and evaluate your WAF before hackers
Since 1991, Web Application Firewall, commonly referred to as WAF, has become one of the most...
2024-3-11 21:57:52 | 阅读: 32 |
收藏
|
Wallarm Blog - lab.wallarm.com
gotestwaf
injection
payload
grpc
security
Top 4 Essential Strategies for Securing APIs To Block Compromised Tokens
Government bodies are clamping down heavily on institutions and organizations that handle sen...
2024-3-8 09:46:55 | 阅读: 51 |
收藏
|
Wallarm Blog - lab.wallarm.com
security
trls
cloud
Previous
4
5
6
7
8
9
10
11
Next