Aggregator
pqcscan: Open-source post-quantum cryptography scanner
pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms they claim to support. It saves the results in JSON files. You can turn one or more of these files into an HTML report that opens in a web browser. The road to PQC “I created pqcscan because we see all the big ones rolling out PQC algorithms in production,” Vincent Berg, CTO at Anvil … More →
The post pqcscan: Open-source post-quantum cryptography scanner appeared first on Help Net Security.
Испанская разведка в руках Китая? Huawei нашли лазейку в законах ЕС
安全动态回顾|3项网络安全国家标准获批发布 原子macOS infostealer增加了持续攻击的后门
银狐情报共享 | Att&CK视角下的最新活跃技战术分享
蓝牙漏洞可能会让黑客通过麦克风窃取信息
安全动态回顾|3项网络安全国家标准获批发布 原子macOS infostealer增加了持续攻击的后门
银狐情报共享 | Att&CK视角下的最新活跃技战术分享
蓝牙漏洞可能会让黑客通过麦克风窃取信息
JVN: リコー製Web Image Monitorを実装している複数のレーザープリンタおよび複合機(MFP)における反射型クロスサイトスクリプティングの脆弱性
英伟达警告 GPU 的 RowHammer 比特翻转攻击
CVE-2018-9857 | PHP Scripts Mall Match Clone Script 1.0.4 searchbyid.php Search cross site scripting (EDB-44486)
WildCard/野卡官网正在恢复中 目前消费功能正常但充值和退款无法恢复
绿盟虚拟汽车靶场(四):零部件内网攻防
Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo
Security researchers have successfully demonstrated a sophisticated jailbreak attack against Grok-4, X’s advanced AI language model, by combining two powerful exploit techniques known as Echo Chamber and Crescendo. This breakthrough highlights growing concerns about the vulnerability of large language models to coordinated attack strategies that can bypass multiple layers of safety mechanisms. The attack represents […]
The post Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2015-1487 | Symantec Endpoint Protection Manager up to 12.1 Filename input validation (EDB-37812 / Nessus ID 85256)
Bitdefender PHASR: Proactive hardening demo overview
Discover how Bitdefender PHASR enables organizations to identify and remediate security misconfigurations before attackers can exploit them. This demo walks through PHASR’s proactive hardening capabilities, showing how it transforms visibility into actionable protection.
The post Bitdefender PHASR: Proactive hardening demo overview appeared first on Help Net Security.