Aggregator
Android安全公告:2025年9月更新修复两个已被主动利用的漏洞(CVE-2025-38352与CVE-2025-48543)
数据安全巨头Varonis收购SlashNext 斥资7000万美元加码反钓鱼攻防体系
Inf0s3c窃密木马警报:新型Python恶意程序正滥用Discord窃取数据
新型钓鱼攻击警报:黑客利用OneDrive窃取企业高管凭证
Google addressed two Android flaws actively exploited in targeted attacks
谷歌搜索垄断案世纪判决落槌 科技巨头解体战幕正式开启
CVE-2025-6507高危漏洞预警(CVSS 9.8):H2O-3机器学习框架存在重大安全风险
九三在即,360全力护航国家级数字安保
CVE-2025-57808:ESPHome Web服务器认证绕过漏洞曝光
恶意npm包仿冒Nodemailer劫持加密货币
Soar is your Safest Bet
It’s the middle of the week, you are working on a project that needs to be done, and while you are trying to focus, you get the same phishing alert for the 10th time this week. Your team is drowning in noise, and you’re looking around thinking, ‘It’s 2025. There has to be an [...]
The post Soar is your Safest Bet appeared first on Hurricane Labs.
The post Soar is your Safest Bet appeared first on Security Boulevard.
史上最大规模DDoS攻击:Cloudflare成功拦截11.5 Tbps破纪录攻击
When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook
What do a pharma firm, a hospital service provider, and your smart doorbell have in common? They were all targets in cyberattacks last month. Here’s the August end-of-month threat rundown from the ColorTokens Threat Advisory Team, a peek into how threat actors are rewriting the rules, one zero-day or botnet at a time. And if […]
The post When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook appeared first on ColorTokens.
The post When Hackers Pivot and Hospitals Freeze: What the Latest Threats Reveal About Cybercrime’s New Playbook appeared first on Security Boulevard.
Attackers Are Abusing Malicious PDFs: Here’s How to Spot Them Early
Phishing has moved far beyond suspicious links. Today, attackers hide inside the files employees trust most; PDFs. On the surface, they look like invoices, contracts, or reports. But once opened, these documents can trigger hidden scripts, redirect to fake login pages, or quietly steal credentials. The danger lies in how convincing they are. PDFs often […]
The post Attackers Are Abusing Malicious PDFs: Here’s How to Spot Them Early appeared first on Cyber Security News.