Aggregator
ZDI-CAN-29119: GNU
ZDI-CAN-29320: Microsoft
ZDI-CAN-29156: KeePassXC
Threat Actors Deploy ‘AuraStealer’ Infostealer with 48 C2 Domains and Active Campaigns
A new information-stealing malware called AuraStealer has been making its presence felt across the cybersecurity landscape since mid-2025. Developed and actively maintained by a group of Russian-speaking individuals, the malware first appeared on underground hacker forums in July 2025, shortly after the disruption of the Lumma stealer infrastructure left a notable gap in the infostealer […]
The post Threat Actors Deploy ‘AuraStealer’ Infostealer with 48 C2 Domains and Active Campaigns appeared first on Cyber Security News.
CVE-2026-0754 | HP VVX/Edge E/Trio 8300 SIP Service hard-coded key
CVE-2026-3336 | Amazon AWS-LC up to 1.68.x PKCS7_verify certificate validation (GHSA-cfwj-9wp5-wqvp)
CVE-2026-3338 | Amazon AWS-LC up to 1.68.x PKCS7_verify signature verification (GHSA-jchq-39cv-q4wj)
CVE-2026-2256 | ModelScope ms-agent up to 1.6.0rc1 code injection
CVE-2026-20757 | Gallagher Command Centre Server up to 9.00 Morpho locking
CVE-2026-3337 | Amazon AWS-LC/AWS-LC-FIPS up to 1.68.x EVP CIPHER API EVP_aes_128_ccm/EVP_aes_192_ccm/EVP_aes_256_ccm timing discrepancy (GHSA-frmv-5gcm-jwxh)
CVE-2025-47147 | Gallagher Command Centre Mobile Client up to 9.40.122 on Android/iOS Session Token cleartext storage
Turning Threat Intelligence into Bug Bounty Gold: A Practical Workflow
日本计划禁止飞机乘客使用充电宝
【资料】近期《情报杂志》以色列、伊朗、美国相关情报研究论文
【工具】伊朗开源情报资源网站
Смартфон работает на мошенников, пока вы спите. Похоже, ваш гаджет нашел себе сомнительную подработку
派拉蒙拟将Paramount+与HBO Max合并
5 years of shifting cybersecurity behavior
Online security is built through routine decisions made across devices and accounts. People choose how to create passwords, how often to reuse them, and how much effort to invest in protecting personal data. The National Cybersecurity Alliance and CybSafe’s Oh, Behave! The Cybersecurity Attitudes and Behaviors Report: 2021–2025 follows those patterns over five years, drawing on responses from more than 24,000 adults and documenting how attitudes and behaviors shift over time. “Five years of data … More →
The post 5 years of shifting cybersecurity behavior appeared first on Help Net Security.