Aggregator
又!FBI在法国机场逮捕不会计算机的俄罗斯篮球运动员
McDonald’s AI Hiring Bot Exposed with ‘123456’ Password — Millions of Job‑Seekers’ Data at Risk
A shocking security vulnerability in McDonald’s AI-powered hiring system has exposed the personal information of millions of job applicants, after security researchers discovered they could access the entire database using the laughably weak password “123456.” The breach affects McHire.com, McDonald’s primary recruitment platform used by franchisees nationwide, where an AI chatbot named “Olivia” screens potential […]
The post McDonald’s AI Hiring Bot Exposed with ‘123456’ Password — Millions of Job‑Seekers’ Data at Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
GitPhish: New Tool Automates GitHub Device Code Phishing Attacks
Security researchers revealed the dangers of GitHub Device Code Phishing—a technique that leverages the OAuth 2.0 Device Authorization Grant flow. This method can turn a simple eight-digit code and a phone call into a full compromise of an organization’s GitHub repositories and software supply chain. Despite its simplicity, executing these attacks at scale has traditionally […]
The post GitPhish: New Tool Automates GitHub Device Code Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
「新办企业注册社保登记」如何办理企业社会保险登记?
C-suites step up on OT cybersecurity, and it’s paying off
There has been a significant increase in the global trend of corporations planning to integrate cybersecurity under the CISO or other executives, according to Fortinet. Growing maturity in OT cybersecurity processes and solutions (Source: Fortinet) OT security moves up the chain of command As accountability continues to shift into executive leadership, OT security is elevated to a high-profile issue at the board level. 52% of organizations report that the CISO is responsible for OT, up … More →
The post C-suites step up on OT cybersecurity, and it’s paying off appeared first on Help Net Security.
Azure Service Command and Control HTTP traffic forwarding part 3
Unpatchable Vulnerabilities in Windows 10/11: Security Report 2025
Киберразведка: оставим в стороне классический TI и копнем глубже
【黑产大数据】2025年上半年数据泄露风险态势报告
【黑产大数据】2025年上半年数据泄露风险态势报告
严正声明
罗马大学 | 预测性上下文敏感模糊测试
罗马大学 | 预测性上下文敏感模糊测试
Global software supply chain visibility remains critically low
Only 23% of organizations are confident that they have very high visibility of their software supply chain, according to LevelBlue’s Data Accelerator. The limited visibility reported by organizations significantly impacts their cyber resilience. Poor risk visibility leaves software supply chains vulnerable This Accelerator is an in-depth analysis into data from the 2025 LevelBlue Futures Report, comparing risk appetites, investment gaps, and overall preparedness to help organizations secure their end-to-end software supplier ecosystem. It shows software … More →
The post Global software supply chain visibility remains critically low appeared first on Help Net Security.