Description
API Rug Pull - The NIST NVD Database and API<br/>
<a href="https://isc.sans.edu/diary/API%20Rug%20Pull%20-%20The%20NIST%20NVD%20Database%20and%20API%20%28Part%204%20of%203%29/30868">https://isc.sans.edu/diary/API%20Rug%20Pull%20-%20The%20NIST%20NVD%20Database%20and%20API%20%28Part%204%20of%203%29/30868</a><br/>
Cisco Patches Vulnerabilities and Discovers Arcane Backdoor<br/>
<a href="https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/">https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/</a><br/>
Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers<br/>
<a href="https://citizenlab.ca/2024/04/vulnerabilities-across-keyboard-apps-reveal-keystrokes-to-network-eavesdroppers/">https://citizenlab.ca/2024/04/vulnerabilities-across-keyboard-apps-reveal-keystrokes-to-network-eavesdroppers/</a><br/>
MySQL2: Dangers of User-Defined Database Connections<br/>
<a href="https://blog.slonser.info/posts/mysql2-attacker-configuration/">https://blog.slonser.info/posts/mysql2-attacker-configuration/</a><br/>
Netgear Nighthawk Vulnerabilities<br/>
<a href="https://jvn.jp/en/vu/JVNVU91883072/">https://jvn.jp/en/vu/JVNVU91883072/</a><br/>