Aggregator
瑞士发布了完整开源的大模型 Apertus
Более 1,67 миллиарда Wi-Fi сетей в открытом доступе: Пентагон, Белый Дом и вы — в одном списке
Release Notes: Fresh Connectors, SDK Update, and 2,200+ New Detection Rules
August was a busy month at ANY.RUN. We expanded our list of connectors with Microsoft Sentinel and OpenCTI, added Linux Debian (ARM) support to the SDK, and strengthened detection across hundreds of new malware families and techniques. With fresh signatures, rules, and product updates, your SOC can now investigate faster, detect more threats in real time, and keep defenses sharp […]
The post Release Notes: Fresh Connectors, SDK Update, and 2,200+ New Detection Rules appeared first on ANY.RUN's Cybersecurity Blog.
从删库到跑路:我的Python全栈踩坑实录
Google Services Down For Most Of The Users In US, Turkey And Eastern Europe
A significant outage of Google services, including its search engine, Gmail, and YouTube, has affected users across Turkey and several countries in Eastern Europe. The disruption, which began on Thursday morning, also impacted other popular platforms such as Google Maps, Drive, and Analytics. Monitoring websites like Downdetector confirmed widespread service interruptions, with a spike in […]
The post Google Services Down For Most Of The Users In US, Turkey And Eastern Europe appeared first on Cyber Security News.
有趣的逻辑缺陷到后台登录
【中秋好礼、翻倍奖励、新人加成】OSRC邀你共同加入双十一保卫战
Родители купили робота, чтобы дети играли, а оказалось — чтобы за ними следили
Threat Actors Abuse Hexstrike-AI Tool to Accelerate Exploitation
Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions
Microsoft has officially acknowledged a significant bug in recent Windows security updates that is causing application installation and repair failures across multiple versions of Windows 10, Windows 11, and Windows Server. The issue stems from a security enhancement in the August 2025 updates, which now incorrectly triggers User Account Control (UAC) prompts for standard, non-administrator […]
The post Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions appeared first on Cyber Security News.
腾讯安全沙龙(南京站)硬核来袭|与大咖共探AI攻防,挑战30万LLMWAF大奖
Threat Actors Using Stealerium Malware to Attack Educational Organizations
Educational institutions have become prime targets in the escalating battle against commodity information stealers. First emerging in 2022 as an open-source project on GitHub, Stealerium was initially released “for educational purposes” but rapidly attracted illicit interest. Adversaries adapted and enhanced the code to create variants—such as Phantom Stealer and Warp Stealer—resulting in a family of […]
The post Threat Actors Using Stealerium Malware to Attack Educational Organizations appeared first on Cyber Security News.
Как выбрать решение многофакторной аутентификации: 5 критериев выбора
CVE-2025-9478
CVE-2025-4609
CVE-2025-8088
Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers
The Django development team has issued critical security updates to address a high-severity vulnerability that could allow attackers to execute malicious SQL code on web servers using the popular framework. The flaw, identified as CVE-2025-57833, affects multiple versions of Django, prompting an urgent call for all users to upgrade their installations as soon as possible. […]
The post Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers appeared first on Cyber Security News.
Мошенник: «Как мне обойти модерацию?» Grok: «Оставь мне ссылку, я её сам опубликую. Мы с тобой теперь партнёры»
New threat group uses custom tools to hijack search results
ESET Research has identified a new threat group called GhostRedirector. In June 2025, this group broke into at least 65 Windows servers, mostly in Brazil, Thailand, Vietnam, and the United States. Countries where GhostRedirector victims were detected (Source: ESET) GhostRedirector used two custom tools that had not been documented before: a passive C++ backdoor called Rungan and a malicious IIS module called Gamshen. The group is very likely linked to China. Rungan can run commands … More →
The post New threat group uses custom tools to hijack search results appeared first on Help Net Security.