Aggregator
某黑产最新攻击链样本分析
幽狼GhostWolf——根据内存数据结构定位敏感信息
WinDump-后渗透信息/密码/凭证收集工具
ByteSRC全域众测|3倍积分!送Apple全家桶!
越南黑客组织借虚假 AI 视频生成网站散布恶意程序
微软 OneDrive 存在严重权限漏洞,百万用户面临数据泄露风险
假冒 Bitdefender 网站传播三种恶意软件工具
黑客组织利用 Ivanti 漏洞攻击多国关键组织
Mimo 黑客组织利用 Craft CMS 高危漏洞部署加密矿工与代理软件
根除隐形威胁:检测、利用及修复跨 GitHub 的路径遍历漏洞
苹果五年拦截 90 亿美元欺诈交易,应用商店威胁持续升级
Find the Best CIAM Solution for Your Business: A Comprehensive Guide to Modern Customer Identity Management
We've reached a point where customers won't wait even a few seconds for an app to load or a login to work. In this new era of digital impatience, CIAM platforms have become business critical, serving as direct contributors to conversion rates, user retention, and data protection.
The post Find the Best CIAM Solution for Your Business: A Comprehensive Guide to Modern Customer Identity Management appeared first on Security Boulevard.
お知らせ:システムメンテナンスのお知らせ
Building a Security Portfolio Even When You're a Blue Teamer
If you're a junior SOC analyst, a GRC specialist or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It's not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that - whether your job touches logs or legal frameworks.
Czech Government Attributes Foreign Ministry Hack to China
The Czech government on Wednesday said Chinese state hackers stole sensitive declassified information from the republic's foreign ministry as part of a years-long espionage campaign. Czech Ministry of Foreign Affairs attributed the hack to a Chinese nation-state group tracked as APT31.
PumaBot Malware Targets Linux IoT Devices
A botnet targeting Internet of Things devices works by brute forcing credentials and downloading cryptomining software. Researchers call the botnet "PumaBot," since its malware checks for the string "Pumatronix," the name of a Brazilian manufacturer of surveillance and traffic camera systems.
CISA's Leadership Exodus Continues, Shaking Local Offices
An ongoing exodus of top officials and senior leadership at the Cybersecurity and Infrastructure Security Agency's regional offices has left staffers increasingly worried about a potential major shift in mission and continued cuts to staff and spending.
A Peek Behind the Claude Curtain
System-level instructions guiding Anthropic's new Claude 4 models tell it to skip praise, avoid flattery and get to the point, said independent AI researcher Simon Willison, breaking down newly released and leaked system prompts for the Claude Opus 4 and Sonnet 4 models.
CRADLE: Open-Source CTI Platform for Collaborative Threat Analysis
CRADLE is an open-source web application designed to empower Cyber Threat Intelligence (CTI) analysts. The platform streamlines threat analysis workflows through collaborative note-taking, visual relationship mapping, and comprehensive report generation. In today’s rapidly evolving...
The post CRADLE: Open-Source CTI Platform for Collaborative Threat Analysis appeared first on Penetration Testing Tools.