Tag: sql
-
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southeast Asia since 2023.”The threat actor mainly targets the SQL injection vulnerabilities discovered on web applications to access the SQL servers of targeted…
-
Earth Lamia Hackers Exploits Vulnerabilities in Web Applications to Attack Multiple Industries
Cybersecurity researchers at Trend Research have uncovered the aggressive operations of Earth Lamia, an Advanced Persistent Threat (APT) group with a China-nexus, targeting organizations across Brazil, India, and Southeast Asia since 2023. This threat actor has demonstrated a sophisticated approach to cyber intrusions by exploiting SQL injection vulnerabilities in web applications to infiltrate SQL servers…
-
Druva Adds Azure SQL and Blob Storage to Cloud-Native Protection Portfolio
First seen on scworld.com Jump to article: www.scworld.com/brief/druva-adds-azure-sql-and-blob-storage-to-cloud-native-protection-portfolio
-
Threat intelligence platform buyer’s guide: Top vendors, selection advice
Tags: ai, attack, automation, breach, cloud, computing, credentials, crowdstrike, cyber, cybersecurity, dark-web, data, data-breach, deep-fake, detection, dns, edr, email, endpoint, exploit, finance, firewall, fraud, gartner, google, group, guide, identity, incident response, infrastructure, intelligence, kubernetes, law, malicious, malware, microsoft, mitigation, monitoring, network, open-source, phishing, privacy, risk, service, siem, soar, soc, sophos, sql, supply-chain, technology, threat, tool, vpn, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency (CISA) found that since 2023 the majority of exploits were zero days, meaning exploiting heretofore unknown methods. And according to the latest Verizon Data Breach Investigations report (DBIR), the percentage of AI-assisted malicious emails doubled to 10% of the totals they observed over the past two years, making staying…
-
Lehren für die Verteidigung aus den durchgesickerten Lockbit-Verhandlungen
Die Ransomware-Gruppe Lockbit hat kürzlich einen erheblichen Datenverlust erlitten. Ihre Dark-Web-Partnerpanels wurden mit der Nachricht ‘Don’t do crime CRIME IS BAD xoxo from Prague” (Begehen Sie keine Verbrechen, Verbrechen sind schlecht, xoxo aus Prag) verunstaltet, die zu einem MySQL-Datenbank-Dump verlinkt. Dieses Archiv enthält eine SQL-Datei aus der Affiliate-Panel-Datenbank von Lockbit, die zwanzig Tabellen umfasst, darunter…
-
What the LockBit 3.0 data leak reveals
An administration interface instance for the ransomware franchise’s affiliates was attacked on 29 April. Data from its SQL database has been extracted and disclosed First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623780/Ransomware-What-the-LockBit-30-data-leak-reveals
-
Oracle April 2025 Critical Patch Update Addresses 171 CVEs
Oracle addresses 171 CVEs in its second quarterly update of 2025 with 378 patches, including 40 critical updates. Background On April 15, Oracle released its Critical Patch Update (CPU) for April 2025, the second quarterly update of the year. This CPU contains fixes for 171 unique CVEs in 378 security updates across 32 Oracle product…
-
DSGVO-Meldepflichtige Sicherheitslücke in KaPlan Web
Eine kurze (österliche) Meldung für Sicherheits- und Datenschutzverantwortliche in kirchlichen Einrichtungen, die KaPlan Web im Einsatz haben. Es wurde eine Sicherheitslücke gefunden, die eine Manipulation der SQL-Datenbank ermöglichte. Die Einstufung meinerseits ist, dass dies aus DSGVO meldepflichtig für die Betreiber … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/04/16/dsgvo-meldepflichtige-sicherheitsluecke-in-kaplan-web/
-
Erneuter Datenabfluss bei Melting Mind?
Es gibt Hinweise auf ein neues Datenleck bei Melting Mind.Noch am Dienstag (15. April) berichtete der Norddeutsche Rundfunk NDR, dass Melting Mind bei dem Cyberangriff im vergangenen Jahr größeren Schaden abwenden konnte. Laut einem Bericht von heise online hat das Unternehmen jedoch weiterhin Sicherheitsprobleme.So habe eine Suchanfrage am selben Tag in der Schwachstellensuchmaschine Leakix eine…
-
China alleges US cyber espionage during the Asian Winter Games, names 3 NSA agents
Tags: attack, breach, china, cloud, cyber, cyberattack, espionage, exploit, government, hacker, infrastructure, injection, intelligence, international, service, sql, vulnerabilityA deliberate and coordinated campaign: The NCVERC report revealed that between January 26 and February 14, 2025, the Games’ information systems were struck by 270,167 attacks from abroad, with activity peaking on February 8, the day after the event’s formal opening. Of these, 170,864 attacks (63.24%) originated from US-based IP addresses.The cyber onslaught primarily targeted…
-
Top 16 OffSec, pen-testing, and ethical hacking certifications
Tags: access, android, antivirus, application-security, attack, authentication, blockchain, bug-bounty, business, cisco, cloud, computing, credentials, crypto, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, guide, hacker, hacking, incident response, injection, iot, jobs, kali, linux, malware, microsoft, mitigation, mobile, network, penetration-testing, RedTeam, remote-code-execution, reverse-engineering, risk, risk-assessment, sap, skills, sql, technology, threat, tool, training, update, vulnerability, windowsExperiential learning Offensive security can’t be fully mastered through lectures alone. Candidates need hands-on training in lab environments to develop practical skills. Ideally, certification exams should include a practical assessment, such as developing an exploit to compromise a system.Because individuals learn OffSec techniques, such as penetration testing, in different ways, the most effective certifications offer…
-
The SQL Server Crypto Detour
Tags: access, api, backup, credentials, crypto, cryptography, data, encryption, jobs, microsoft, password, service, sql, tool, update, vulnerability, windowsAs part of my role as Service Architect here at SpecterOps, one of the things I’m tasked with is exploring all kinds of technologies to help those on assessments with advancing their engagement. Not long after starting this new role, I was approached with an interesting problem. A SQL Server database backup for a ManageEngine’s…
-
Shopware Security Plugin Vulnerability Enables SQL Injection Attacks
A recently disclosed SQL injection vulnerability in older versions of the Shopware platform has raised concerns among online shop operators. Although Shopware has addressed the issue in its latest release (version 6.5.8.13), it has been revealed that the fix provided by the Shopware Security Plugin for older versions remains incomplete. This vulnerability (CVE-2025-27892) enables attackers…
-
Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code
A critical security flaw has been discovered inHalo ITSM, an IT support management software widely deployed across cloud and on-premise environments. The vulnerability, which allows attackers to inject malicious SQL code, poses a significant threat to organizations relying on the software to manage IT support tickets containing sensitive data such as credentials and internal documentation.…
-
Halo ITSM Vulnerability Exposed Organizations to Remote Hacking
An unauthenticated SQL injection vulnerability in Halo ITSM could have been exploited to read, modify, or insert data. The post Halo ITSM Vulnerability Exposed Organizations to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/halo-itsm-vulnerability-exposed-organizations-to-remote-hacking/
-
WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits
A critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users exposed to unauthenticated SQL injection attacks. The issue, assigned the identifier CVE-2024-13496, carries a high CVSS 3.1 score of 7.5, indicating significant potential for exploitation. CVE-2024-13496 was discovered during a security assessment of GamiPress version 7.2.1. The vulnerability affects all versions…
-
Pre-authentication SQL Injection to RCE in GLPI (CVE-2025-24799 / CVE-2025-24801)
Summary A significant vulnerability has been identified in GLPI, a popular open-source IT asset management tool. This vulnerability, tracked as CVE-2025-24799 and CVE-2025-24801, allows an First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2025/03/14/pre-authentication-sql-injection-to-rce-in-glpi-cve-2025-24799-cve-2025-24801/
-
Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
A newly disclosed vulnerability in the Exim mail transfer agent (CVE-2025-26794) has sent shockwaves through the cybersecurity community, revealing a critical SQL injection flaw that enables attackers to compromise email systems and manipulate underlying databases. The vulnerability, confirmed in Exim Version 4.98 installations using SQLite for hints databases, represents one of the most severe email…
-
China-Linked Threat Group Targets Japanese Orgs’ Servers
Winnti once used a variety of malware but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-group-japanese-orgs-servers
-
Sicherheitslücke: Attacken auf PostgreSQL-Clients möglich
Ein Patch schließt eine Schadcode-Lücke, die unter bestimmten Voraussetzungen für Clients mit Zugriff auf Postgre-SQL-Datenbanken gefährlich werden kann. First seen on heise.de Jump to article: www.heise.de/news/Sicherheitsluecke-Angreifer-koennen-PostgreSQL-Datenbanken-attackieren-10282360.html
-
Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks
Threat actors are exploiting a zero-day SQL injection vulnerability in PostgreSQL, according to researchers from cybersecurity firm Rapid7. Rapid7 researchers discovered a high-severity SQL injection flaw, tracked as CVE-2025-1094, in PostgreSQL’s psql tool. The experts discovered the flaw while investigating the exploitation of the vulnerability CVE-2024-12356 for remote code execution. BeyondTrust patched CVE-2024-12356 in December…
-
Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection
The Apache Software Foundation has disclosed a critical SQL injection vulnerability in its widely utilized financial platform, Apache Fineract. The flaw, tracked as CVE-2024-32838, affects multiple API endpoints and poses a significant risk to applications built on this platform. This vulnerability allows authenticated attackers to inject malicious SQL data, potentially compromising sensitive information and the overall…
-
What is anomaly detection? Behavior-based analysis for cyber threats
a priori the bad thing that you’re looking for,” Bruce Potter, CEO and founder of Turngate, tells CSO. “It’ll just show up because it doesn’t look like anything else or doesn’t look like it’s supposed to. People have been tilting at that windmill for a long time, since the 1980s, trying to figure out what…
-
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7.The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql.”An First…

