Aggregator
今年1月中国市场手机出货量同比下降16.1%
Jumping the Gap: APT37’s “Ruby Jumper” Campaign Weaponizes Cloud Storage and USBs to Breach Isolated Networks
The DPRK-affiliated syndicate APT37 has augmented its arsenal dedicated to breaching air-gapped networks. The Zscaler ThreatLabz vanguard has
The post Jumping the Gap: APT37’s “Ruby Jumper” Campaign Weaponizes Cloud Storage and USBs to Breach Isolated Networks appeared first on Penetration Testing Tools.
Квартирник по безопасной разработке 2026
从采集到回顾,我用 AI 搭建了一套个人信息处理系统
Shadows in the Browser: The UNC6384 Syndicate Unmasks a New PlugX Variant “Arp”
In January 2026, cybersecurity experts at the Japanese firm IIJ intercepted a novel iteration of the PlugX malware,
The post Shadows in the Browser: The UNC6384 Syndicate Unmasks a New PlugX Variant “Arp” appeared first on Penetration Testing Tools.
SIM Swapping: как потерять телефон, не выпуская его из рук
The Synthetic Factory: How the “Genisys” Ad Fraud Scheme Hijacked 25 Million Devices via AI
A smartphone rests securely in a pocket, its screen darkened, its owner initiating nothing; yet at this very
The post The Synthetic Factory: How the “Genisys” Ad Fraud Scheme Hijacked 25 Million Devices via AI appeared first on Penetration Testing Tools.
Statement to the Intelligence and Security Committee by Director-General Andrew Clark 4 March 2026
The Worm Turns – When the Hunter Becomes the Hunted Mass Surveillance and the Weaponization of the Data We Voluntarily Create
Explore how advancements in surveillance infrastructure and the democratization of intelligence have transformed espionage.
The post The Worm Turns – When the Hunter Becomes the Hunted Mass Surveillance and the Weaponization of the Data We Voluntarily Create appeared first on Security Boulevard.
The Worm Turns – When the Hunter Becomes the Hunted Mass Surveillance and the Weaponization of the Data We Voluntarily Create
The Zerobot Botnet Mutates to Hijack Tenda Routers and n8n Automation Hubs
The malicious Zerobot network has commenced the aggressive exploitation of vulnerabilities inherent in Tenda routers and the n8n
The post The Zerobot Botnet Mutates to Hijack Tenda Routers and n8n Automation Hubs appeared first on Penetration Testing Tools.
The Rise of the Autonomous Adversary: How “Hackerbot-Claw” Hijacked Major Open-Source Repositories
According to a StepSecurity report, over the past week, an unidentified bot with the telling name “hackerbot-claw” launched
The post The Rise of the Autonomous Adversary: How “Hackerbot-Claw” Hijacked Major Open-Source Repositories appeared first on Penetration Testing Tools.