Image 1 Cleo File Transfer Tool Vulnerability Exploited in the Wild

Posted: 2024/12/10
Source: Security Week
Tag(s): Data Loss, Headline, Flaw
Image 1 Russian Hacktivists Target Oil, Gas and Water Sectors Worldwide

Posted: 2024/12/10
Source: SC Magazine
Tag(s): Hacker, Russia, Scada, Headline, Terror
Image 1 WhatsApp Finally Fixes View Once Flaw That Allowed Theft of Pics

Posted: 2024/12/10
Source: The Register
Tag(s): Data Loss, Facebook, Flaw, Patch, Privacy, Headline, Phone
Image 1 Heart Surgery Device Maker's Security Bypassed, Data Encrypted and Stolen

Posted: 2024/12/10
Source: The Register
Tag(s): Cryptography, Data Loss, Hacker, Headline, Flaw
Image 1 Google Says It Has Cracked a Quantum Computing Challenge with New Chip

Posted: 2024/12/10
Source: Reuters
Tag(s): Google, Headline, Science
Image 1 Crooks Steal AWS Creds Only to Leave Them in Open S3 Bucket

Posted: 2024/12/10
Source: The Register
Tag(s): Amazon, Cybercrime, Hacker, Password, Headline, Data Loss
Image 1 SAP Patches Critical Vulnerability in NetWeaver

Posted: 2024/12/10
Source: Security Week
Tag(s): Flaw, Headline, Patch
Image 1 Space Startup Looks to Fling Satellites into Space

Posted: 2024/12/10
Source: Gizmodo
Tag(s): Space, USA, Headline, Science
Image 1 QNAP Patches Vulnerabilities Exploited at Pwn2Own

Posted: 2024/12/09
Source: Security Week
Tag(s): Conference, Flaw, Hacker, Headline, Patch
Image 1 Deloitte Responds after Ransomware Group Claims Data Theft

Posted: 2024/12/09
Source: Security Week
Tag(s): Cybercrime, Data Loss, Headline, Hacker
Image 1 Cleo File Transfer Tool Vulnerability Exploited in the Wild

Posted: 2024/12/10
Source: Security Week
Tag(s): Data Loss, Headline, Flaw
Image 1 Russian Hacktivists Target Oil, Gas and Water Sectors Worldwide

Posted: 2024/12/10
Source: SC Magazine
Tag(s): Hacker, Russia, Scada, Headline, Terror
Image 1 WhatsApp Finally Fixes View Once Flaw That Allowed Theft of Pics

Posted: 2024/12/10
Source: The Register
Tag(s): Data Loss, Facebook, Flaw, Patch, Privacy, Headline, Phone
Image 1 Heart Surgery Device Maker's Security Bypassed, Data Encrypted and Stolen

Posted: 2024/12/10
Source: The Register
Tag(s): Cryptography, Data Loss, Hacker, Headline, Flaw
Image 1 Google Says It Has Cracked a Quantum Computing Challenge with New Chip

Posted: 2024/12/10
Source: Reuters
Tag(s): Google, Headline, Science
Image 1 Crooks Steal AWS Creds Only to Leave Them in Open S3 Bucket

Posted: 2024/12/10
Source: The Register
Tag(s): Amazon, Cybercrime, Hacker, Password, Headline, Data Loss
Image 1 SAP Patches Critical Vulnerability in NetWeaver

Posted: 2024/12/10
Source: Security Week
Tag(s): Flaw, Headline, Patch
Image 1 Space Startup Looks to Fling Satellites into Space

Posted: 2024/12/10
Source: Gizmodo
Tag(s): Space, USA, Headline, Science
Image 1 QNAP Patches Vulnerabilities Exploited at Pwn2Own

Posted: 2024/12/09
Source: Security Week
Tag(s): Conference, Flaw, Hacker, Headline, Patch
Image 1 Deloitte Responds after Ransomware Group Claims Data Theft

Posted: 2024/12/09
Source: Security Week
Tag(s): Cybercrime, Data Loss, Headline, Hacker

Storm Watch ()

2024-12-10: 8 news articles added
2024-12-10: 18 files added
2024-11-10: 21 voting polls added

2024-12-08 (1733616000)

Shots fired. 59 bots permanently blocked. I gave them time to adjust. They did not.

Fixed file linking error on search for mobile.
...
[ View Full Changelog ]


Grab Gear ()

Hat Hoodie Mousepad
Hat Hoodie Mousepad

Mug Shirts Phonecase
Mug Shirts Phonecase
Support Packet Storm by grabbing gear! Available January 1, 2025!


Polls ()

Figuring out how to manipulate a flaw to your advantage is at the core of security testing. Different attacks yield different data, but all vectors have their own interesting nuances to exploitation.


What is the most fun to exploit?

AnswersResults
Cross site scripting.0%
SQL injection.25%
Code execution / command injection.50%
Memory-related bugs.0%
Race conditions.0%
People.25%
Storm Watch ()

2024-12-10: 8 news articles added
2024-12-10: 18 files added
2024-11-10: 21 voting polls added

2024-12-08 (1733616000)

Shots fired. 59 bots permanently blocked. I gave them time to adjust. They did not.

Fixed file linking error on search for mobile.
...
[ View Full Changelog ]
Grab Gear ()

Hat Hoodie Mousepad
Hat Hoodie Mousepad

Mug Shirts Phonecase
Mug Shirts Phonecase
Support Packet Storm by grabbing gear! Available January 1, 2025!
Polls ()

Figuring out how to manipulate a flaw to your advantage is at the core of security testing. Different attacks yield different data, but all vectors have their own interesting nuances to exploitation.


What is the most fun to exploit?

AnswersResults
Cross site scripting.0%
SQL injection.25%
Code execution / command injection.50%
Memory-related bugs.0%
Race conditions.0%
People.25%
 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity