Aggregator
50个大模型的网络攻击能力深度测评
CVE-2004-1714 | ISS BlackICE PC Protection/BlackICE Server 3.6ccb protect.ini privileges management (EDB-24362 / Nessus ID 14270)
Wing FTP严重漏洞已遭在野利用
APP_KEYs遭暴露,超600款Laravel应用易遭RCE攻击
Weaponized Games: Threat Actors Target Gen Z Gamers Through Popular Titles
Kaspersky security researchers have discovered sophisticated threat actor activities that take advantage of the digitally native Gen Z population, which was born between 1997 and 2012 and is heavily involved in gaming, streaming, and anime, for malevolent purposes. Over a one-year period from April 1, 2024, Kaspersky documented at least 19 million attempts to disseminate […]
The post Weaponized Games: Threat Actors Target Gen Z Gamers Through Popular Titles appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Rethinking Defense in the Age of AI-Generated Malware
Attackers are using public models and automation tools to generate malware that is unique to every campaign. It doesn't look like anything we've seen before.
The post Rethinking Defense in the Age of AI-Generated Malware appeared first on Security Boulevard.
Man Gets Suspended Sentence for Hate-Fueled UK Train Stations WiFi Hack
Ты говоришь: «Мне страшно жить», ИИ отвечает: «Прыгай с моста»
Interlock Ransomware Unleashes New RAT in Widespread Campaign
Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
Threat actors have exploited Microsoft Compiled HTML Help (CHM) files to distribute malware, with a notable sample named deklaracja.chm uploaded to VirusTotal from Poland. This CHM file, a binary container for compressed HTML and associated objects, serves as a delivery vehicle for a multi-stage infection chain. Upon execution via the default hh.exe handler, the file […]
The post Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
一个 200 美元的 AI 浏览器,想重新教会我「上网」
安全热点周报:Fortinet 公开 FortiWeb 中的严重预身份验证 RCE 漏洞
未明确数据安全负责人或管理机构,某农商行被处罚
2025 CCS成都网络安全技术交流活动定档9月
守护新型数字工作空间 为何浏览器成为企业安全的核心
Security in the Era of AI-speed Exploits
Modern AI attacks require runtime guardrails capable of spanning application, container and node/host runtime environments comprehensively.
The post Security in the Era of AI-speed Exploits appeared first on Security Boulevard.
CVE-2008-2130 | iGaming CMS 1.5 poll_vote.php ID sql injection (EDB-31747 / XFDB-42229)
L3HCTF 2025
Date: July 12, 2025, 1 a.m. — 14 July 2025, 01:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://l3hctf2025.xctf.org.cn/
Rating weight: 23.50
Event organizers: L3H Sec