Aggregator
Certificate Chaos and the Case for Automated Posture Management
长亭科技:2025年国家网络安全宣传周,我在昆明等你!
美国空军部发布关于未来网络的战略发展蓝图
全球最大轮胎厂商疑遭勒索攻击,多个工厂生产中断
汽车轮胎巨头普利司通遭攻击,制造工厂受影响
AI供应链易遭“模型命名空间复用”攻击
Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework
Cybersecurity researchers have identified a sophisticated new command-and-control framework that exploits legitimate Google Calendar APIs to establish covert communication channels between attackers and compromised systems. The MeetC2 framework, discovered in September 2025, represents a concerning evolution in adversarial tactics where threat actors abuse trusted cloud services to bypass traditional security controls and evade detection mechanisms. […]
The post Hackers Leverages Google Calendar APIs With Serverless MeetC2 Communication Framework appeared first on Cyber Security News.
新功能上线!PluginTrace 插件追踪,Yakit 插件“监控台”
CVE-2002-1526 | Emumail Emu Webmail 5.0 emumail.cgi To/From cross site scripting (EDB-21878 / Nessus ID 11748)
CVE-2002-1527 | Emumail Emu Webmail 5.0 Error Message emumail.cgi Path information disclosure (EDB-21877 / ID 50055)
CVE-2002-1528 | Mondosoft Mondosearch 4.4 msmmask.exe mask Source information disclosure (Nessus ID 11163 / ID 10975)
CVE-2002-1529 | SurfControl Superscout Email Filter 4.0 Administrative Web Interface msgError.asp Reason cross site scripting (EDB-21924 / ID 50058)
SVG files used in hidden malware campaign impersonating Colombian authorities
New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto
A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency on compromised machines. First detected in late August 2025, this attack exploits legitimate system binaries to load a custom cryptomining payload directly into memory, thwarting traditional antivirus signatures and curtailing forensic artifacts. Security researchers have […]
The post New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DigitalOcean adds Single Sign-On to help businesses centralize user access
DigitalOcean has announced support for Single Sign-On. This integration is designed to provide digital native businesses with secure authentication to their DigitalOcean accounts. DigitalOcean Single Sign-On (SSO) helps to centralize user access and makes user onboarding and offboarding seamless. It’s built on the industry-standard OpenID Connect (OIDC) protocol, ensuring secure and reliable authentication. SSO connects your existing Identity Provider (IdP) to DigitalOcean, starting with Okta and expanding to other leading IdPs in the future. For … More →
The post DigitalOcean adds Single Sign-On to help businesses centralize user access appeared first on Help Net Security.