Aggregator
The ransomware economy is shifting toward straight-up data extortion
Google’s research report on ransomware activity last year underscores how cybercrime is evolving and clouding a collective understanding of its full impact and scale.
The post The ransomware economy is shifting toward straight-up data extortion appeared first on CyberScoop.
Attackers are exploiting AI faster than defenders can keep up, new report warns
Cybersecurity is entering “a new phase” as artificial intelligence tools have matured and given IT defenders significantly less time to respond to cyberattacks and other threats, according to a new report released Monday. The report, authored by federal contractor Booz Allen Hamilton, concludes that threat actors have adopted AI more quickly than governments and private […]
The post Attackers are exploiting AI faster than defenders can keep up, new report warns appeared first on CyberScoop.
Washington is right: Cybercrime is organized crime. Now we need to shut down the business model
The executive order finally calls cyber-enabled fraud what it is: transnational organized crime. Now the U.S. has to act like it—and the private sector has to stop settling for defense-only while the criminal infrastructure stays intact.
The post Washington is right: Cybercrime is organized crime. Now we need to shut down the business model appeared first on CyberScoop.
Veeam 修复位于备份服务器上的多个 RCE 漏洞
谷歌修复已遭利用的两个新 0day
某运营商路由器秘密将遥测数据发送到一家土耳其人工智能公司
谷歌2025年发放了近1.2亿元漏洞赏金,单个漏洞最高奖励170万元
观点 | 科学构建人工智能法律体系
专家解读 | 深入贯彻落实数据产权制度 依法保障各方主体合法权益
国家安全部提醒:别让无线设备“出卖”你
专题·原创 | 立足数智时代,夯实网络安全治理的法制框架
Hackers tried to breach Poland’s nuclear research centre
Poland’s National Centre for Nuclear Research (NCBJ) thwarted a cyberattack targeting its IT infrastructure. The attempted intrusion was detected and blocked before attackers could compromise systems or disrupt operations. “No production, operational, or research processes were disrupted, and the MARIA reactor is operating safely and smoothly, at full power,” said Prof. Jakub Kupecki, Director of the National Centre for Nuclear Research. The National Centre for Nuclear Research is one of the largest scientific institutes in … More →
The post Hackers tried to breach Poland’s nuclear research centre appeared first on Help Net Security.
Possible New Result in Quantum Factorization
sg dma缓冲区cache同步批处理优化
上周关注度较高的产品安全漏洞(20260309-20260315)
CNVD漏洞周报2026年第10期
Подмена кошельков прямо в браузере. Вот как популярная платформа AppsFlyer подставила тысячи сайтов
KEEQuant advances chip-scale QKD for telecom, data centers, and critical infrastructure
KEEQuant has announced its commercial chip-scale QKD technology, marking an advance in quantum-secure communications. The system replaces bulky optical assemblies with photonic integration, lowering the cost and complexity of quantum key distribution and making quantum-safe key exchange a practical upgrade for telecom operators, data center providers, and critical infrastructure organizations. The result is smaller, more scalable systems that remain compatible with existing fiber environments and encryption solutions, making adoption more practical for organizations preparing their … More →
The post KEEQuant advances chip-scale QKD for telecom, data centers, and critical infrastructure appeared first on Help Net Security.
Supply Chain Shield: How DepConfuse Proactively Stops Dependency Confusion Attacks
DepConfuse is a command-line tool that proactively detects dependency confusion vulnerabilities. It scans SBOMs or PURLs to identify internal
The post Supply Chain Shield: How DepConfuse Proactively Stops Dependency Confusion Attacks appeared first on Penetration Testing Tools.