Aggregator
APT-C-06(DarkHotel)利用BYOVD技术的最新攻击活动分析
Telegram, WhatsApp и другие — теперь в зоне прослушки? В России хотят мониторить мессенджеры в реальном времени
OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications
The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a significant milestone in addressing the growing security challenges posed by artificial intelligence implementations across industries. This specialized framework emerges as organizations worldwide increasingly integrate AI solutions into critical operations, from healthcare diagnostics to financial risk […]
The post OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications appeared first on Cyber Security News.
中小企业必读:抵御毁灭性DDoS攻击实战指南
破局与融合:破解开发与供应链安全的业务场景难题
【落地有声】专栏第五期:商业银行新一代核心业务系统上线前的安全攻略
North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks
Cybersecurity researchers and targeted individuals have reported a highly sophisticated scam orchestrated by suspected North Korean hackers. This attack, disguised as a legitimate Zoom meeting, leverages advanced social engineering techniques to trick professionals into compromising their systems. The campaign, which surfaced recently, highlights the growing audacity and technical prowess of state-sponsored threat actors aiming to […]
The post North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Using AI to Identify Patterns in Vishing Attempts
AI-powered defenses offer clear strategic advantages for telecom providers and enterprise security teams to help combat vishing attacks.
The post Using AI to Identify Patterns in Vishing Attempts appeared first on Security Boulevard.
聊过 200 个团队后的暴论:不要拿 AI 造工具,要建设「新关系」
High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218)
A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations. The vulnerability has been patched in WinRAR 7.12 beta 1, released on June 10, 2025, and users are advised to upgrade to it as soon as possible. (The beta version is expected to be replaced by the final 7.12 release soon.) About CVE-2025-6218 WinRAR is a popular file archiver utility for Windows that’s … More →
The post High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) appeared first on Help Net Security.
Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers
A sophisticated malware campaign has emerged targeting WordPress and WooCommerce websites with highly obfuscated credit card skimmers and credential theft capabilities, representing a significant escalation in e-commerce cyberthreats. The malware family demonstrates advanced technical sophistication through its modular architecture, featuring multiple variants designed for different malicious purposes including payment data theft, WordPress credential harvesting, and […]
The post Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers appeared first on Cyber Security News.
奇安信集团与河南警察学院网络安全系签约 携手推进公安大模型与数据安全
教您如何构建“韧性安全体系”
Союзник или угроза?
CVE-2005-3412 | Elite Forum 1.0.0.0 cross site scripting (EDB-26447 / BID-15257)
CVE-2013-3163 | Microsoft Internet Explorer 8/9/10 code injection (ms13-jul / MS13-JUL)
《全球数据泄露态势月度报告》(2025年5月)| 附下载地址
U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
Security researchers at SecurityScorecard have uncovered a sprawling cyber-espionage campaign orchestrated by the LapDogs Operational Relay Box (ORB) Network, a sophisticated infrastructure compromising over 1,000 devices worldwide. Identified as a key tool for China-Nexus threat actors, LapDogs primarily targets Small Office/Home Office (SOHO) routers and IoT devices, particularly Linux-based systems, to facilitate covert operations. This […]
The post LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.