Aggregator
新型 Linux 僵尸网络 SSHStalker 采用老式 IRC 协议进行命令与控制通信
Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware
Yubico’s upcoming YubiKey 5.8 firmware introduces standardized APIs that integrate hardware-backed signatures with passkey authentication. To enable privacy-capable digital signatures using passkeys, expanded enterprise IdP support, and next-generation digital wallet use cases, the firmware adds support for FIDO CTAP 2.3 and preview WebAuthn signing extensions. “The adoption of CTAP 2.3, together with enhancements such as the W3C signing extension, enables usable digital signatures in web applications and services where digital signing is part of the … More →
The post Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware appeared first on Help Net Security.
春节防“伪”指南:360安全智能体识破仿冒网站,护航安心年
Windows Remote Access Connection Manager 0-Day Vulnerability Let Attackers Trigger DoS Attack
Microsoft has patched a zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan) service, tracked as CVE-2026-21525, which allowed attackers to trigger denial-of-service (DoS) conditions on unpatched systems. The flaw, stemming from a NULL pointer dereference (CWE-476), was actively exploited in the wild before disclosure, earning an “Exploitation Detected” rating from Microsoft’s MSRC exploitability […]
The post Windows Remote Access Connection Manager 0-Day Vulnerability Let Attackers Trigger DoS Attack appeared first on Cyber Security News.
文末领福利!Yak Project 致用户与共建者们的2025年报
Sophisticated Cyber Attack Targets Wedding Industry With Teams-Based Malware Delivery
A sophisticated phishing campaign targets wedding planners and vendors with stealer malware disguised as Microsoft Teams meetings. Security researchers highlight the use of compromised legitimate emails to build trust before delivering payloads. Threat actors impersonate legal professionals in emails from czimmerman@craigzlaw[.]com, a domain tied to The Law Offices of Craig Zimmerman, a real consumer protection […]
The post Sophisticated Cyber Attack Targets Wedding Industry With Teams-Based Malware Delivery appeared first on Cyber Security News.
5 миллисекунд на деанон. Новый инструмент Adbleed видит тебя даже через Tor
CVE-2025-34164
Rust в квадрате. ОС Redox научилась собирать Rust-приложения внутри самой себя
Qilin
You must login to view this content
从隐蔽流转异常到跨源关联分析,保旺达构建跨域缓慢漂移行为智能识别方案
谷歌高管警告:AI 驱动的网络攻击工具包“只是时间问题”
Qilin
You must login to view this content
Locking the Locks: How “RansomWhen” Unmasks the Identities Hijacking Your AWS S3 Buckets
RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as
The post Locking the Locks: How “RansomWhen” Unmasks the Identities Hijacking Your AWS S3 Buckets appeared first on Penetration Testing Tools.
Socelars Malware Attacking Windows Systems to Steal Sensitive Business Data
A dangerous information-stealing malware called Socelars is actively targeting Windows systems to collect sensitive authentication data, with particular focus on Facebook Ads Manager accounts and session cookies. Unlike traditional malware that causes immediate system damage, Socelars operates silently in the background, turning infected machines into gateways for account takeover and financial fraud. Socelars is sophisticated […]
The post Socelars Malware Attacking Windows Systems to Steal Sensitive Business Data appeared first on Cyber Security News.
The Hunter Becomes the Hunted: “Evil AI” WormGPT Suffers Massive Leak of 19,000 User Accounts
The WormGPT platform, notoriously recognized as an AI-augmented instrument for orchestrating cyber-offensives and infiltrations, has purportedly suffered a
The post The Hunter Becomes the Hunted: “Evil AI” WormGPT Suffers Massive Leak of 19,000 User Accounts appeared first on Penetration Testing Tools.
Under Siege: Microsoft Unveils “Valentine’s Day” Fixes for 6 Actively Exploited Zero-Days
Microsoft has disseminated its February Patch Tuesday security ensemble, a particularly dense release that addresses a staggering 58
The post Under Siege: Microsoft Unveils “Valentine’s Day” Fixes for 6 Actively Exploited Zero-Days appeared first on Penetration Testing Tools.
Emerging Ransomware BQTLock & GREENBLOOD Disrupt Businesses in Minutes
How long would it take your team to realize ransomware is already running? The newly identified ransomware families are already causing real business disruption. These threats can disrupt operations fast while also reducing visibility through stealth or cleanup activity, shrinking the time teams have to detect and contain the attack. Here’s what you should know about BQTLock and GREENBLOOD, and how your team can detect and contain them before […]
The post Emerging Ransomware BQTLock & GREENBLOOD Disrupt Businesses in Minutes appeared first on ANY.RUN's Cybersecurity Blog.
Digital Siege: How Singapore Thwarted UNC3886’s Surgical Strike on its Telecom Backbone
Singapore’s preeminent telecommunications providers have fallen prey to a sophisticated cyber espionage campaign orchestrated by the formidable adversarial
The post Digital Siege: How Singapore Thwarted UNC3886’s Surgical Strike on its Telecom Backbone appeared first on Penetration Testing Tools.