Aggregator
US warns of Iranian hackers targeting critical infrastructure
Lynx
You must login to view this content
SandboxJS 连环沙箱逃逸漏洞深度解析(CVE-2026-26954)
Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities
The program comes as the tech industry races to secure software before similar AI-powered offensive capabilities become too much for defenders to handle.
The post Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities appeared first on CyberScoop.
Знакомьтесь, ваша замена: робот GEN-1 складывает сотни футболок без ошибок. И не устаёт ни на секунду
Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn
Iranian government hackers are launching disruptive cyberattacks on American energy and water infrastructure, U.S. government agencies “urgently” warned Tuesday. The hackers are taking aim at devices and systems that control industrial processes, and have harmed victims in the last month following the onset of U.S.-Israel strikes against Iran, according to the joint alert from the […]
The post Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn appeared first on CyberScoop.
Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware
HackMyVM-Gitdwn 靶机WP
用 OpenClaw 插件机制实现 AI Agent 安全管控
内核nf_tables漏洞--CVE-2024-1086 复现
После взлома — сжечь. Северная Корея запустила производство одноразовых вирусов
PolarCTF2026春季个人赛 Web方向全解
CISCN&长城杯 2026分区赛区AWDP-Web
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted.
AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...
The post Cybersecurity in the Age of Instant Software appeared first on Security Boulevard.
Russia Hacked Routers to Steal Microsoft Office Tokens
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.
The post Russia Hacked Routers to Steal Microsoft Office Tokens appeared first on Security Boulevard.