Aggregator
Qilin
You must login to view this content
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
The notorious Russian cyberespionage group Fancy Bear, also known as APT28, has intensified its operations against governments and military entities worldwide using an arsenal of sophisticated new tools and techniques. Active since 2007, this state-sponsored threat actor has established itself as one of the most persistent and dangerous cyber adversaries, with a documented history of […]
The post Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools appeared first on Cyber Security News.
Прыжок в пекло ради науки. 18 июля NASA запустит SNIFS к Солнцу
CVE-2025-46002 | Filemanager up to 2.5.0 HTTP Request filemanager.php path traversal (Exploit 38945 / EUVD-2025-21878)
CVE-2024-13175 | Vidco VOC Tester up to 12.40.x authorization
CVE-2025-46001 | Filemanager 2.3.0 PHP File is_allowed_file_type unrestricted upload (Exploit 38895 / EDB-38895)
UK sanctions Russian hackers, spies as US weighs its own punishments for Russia
The hackers were allegedly involved in operations against Ukraine and a Russian on U.K. soil, the latter with malware tied to U.S. 2016 election interference.
The post UK sanctions Russian hackers, spies as US weighs its own punishments for Russia appeared first on CyberScoop.
【资料】利用美军情报杂志实测各种AI的总结能力
Akira
You must login to view this content
Akira
You must login to view this content
狗看电视的模式
Минцифры изменит правила отсрочки для айтишников: кого включат в весну-2026
3 Ways Security Teams Can Minimize Agentic AI Chaos
Выключи метаболизм — и живи вечно. Яйцеклетки преподают нам уроки бессмертия
美国法官允许作家对 Anthropic 盗版数百万电子书提起集体诉讼
国防科技大学 | 针对大型语言模型的离线文本对抗攻击
Top 10 Malware Q2 2025
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
A sophisticated malware campaign targeting Ivanti Connect Secure VPN devices has been actively exploiting critical vulnerabilities CVE-2025-0282 and CVE-2025-22457 since December 2024. The ongoing attacks demonstrate advanced persistent threat techniques, deploying multiple malware families including MDifyLoader, Cobalt Strike Beacon, vshell, and Fscan to establish long-term access to compromised networks. The attack begins with threat actors […]
The post Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon appeared first on Cyber Security News.
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
Three critical vulnerabilities in the Sophos Intercept X for Windows product family could allow local attackers to achieve arbitrary code execution with system-level privileges. Identified as CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, the flaws span registry permission misconfigurations, a weakness in the Device Encryption component, and an issue in the Windows installer running under the SYSTEM account. […]
The post Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution appeared first on Cyber Security News.