Aggregator
当AI智能体学会“欺骗”,我们如何自保?来自火山的MCP安全答卷
Weekoverzicht Defensieoperaties
戴尔紧急回应!100+型号笔记本需立即更新固件
手机平板等你挖!荣耀 “秋天的第一个漏洞” 活动开启
无"痕"加载驱动模块之傀儡驱动 (上)
【漏洞通告】Cursor远程代码执行漏洞(CVE-2025-54135)
When Your Logs Lie to You: Log Prompt Poisoning & Injection Risks in XDR AI Summaries
Generative AI copilots are transforming SOC workflows, but they’re not immune to manipulation. Inspired by Ben Nassi’s PromptWare research at Black Hat 2024, this post explores how poisoned log data can hijack XDR summaries, turning defensive tools into attack vectors.
The post When Your Logs Lie to You: Log Prompt Poisoning & Injection Risks in XDR AI Summaries appeared first on Sygnia.
NCSC Updates Cyber Assessment Framework to Build UK CNI Resilience
Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders
Unit 42 researchers have identified significant overlaps between Microsoft’s reported ToolShell exploit chain targeting SharePoint vulnerabilities and a tracked activity cluster dubbed CL-CRI-1040. This cluster, active since at least March 2025, deploys a custom malware suite named Project AK47, comprising multi-protocol backdoors, ransomware, and DLL side-loading loaders. Microsoft’s analysis attributes the activity to Storm-2603, a […]
The post Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft вскрывает WinUI… но сначала выпотрошит всё, что не для чужих глаз
实战淬炼硬功 使命薪火相传 | 第二届青马红客“精英训练营”圆满举办!
伊朗网络战略正在向系统多维和跨域整合方向发展
3600万元奖金池重金求洞!科技巨头推出最大安全众测项目
Cybersecurity and the development of software-defined vehicles
In many automotive companies, the same systems-engineering teams are responsible for both safety and security. As a result, cybersecurity is treated as a subset of safety, undergirded by an implicit assumption: “If it’s safe, it must be secure.” But that’s not necessarily always the case. As so many chief information and product security officers across the industry have seen, a vehicle deemed functionally safe under ISO 26262 can be highly vulnerable to cyber threats, especially … More →
The post Cybersecurity and the development of software-defined vehicles appeared first on Help Net Security.