Aggregator
搞定那个加密的公众号:一次有点折腾的密钥固定实战
3 months 2 weeks ago
固定某公众号前端加密密钥,从而绕过加密限制。
Please Don’t Feed the Scattered Lapsus ShinyHunters
3 months 2 weeks ago
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »
BrianKrebs
Please Don’t Feed the Scattered Lapsus ShinyHunters
3 months 2 weeks ago
A prolific data ransom gang that calls itself Scattered Lapsus ShinyHunters (SLSH) has a distinctive playbook when it seeks to extort payment from victim firms: Harassing, threatening and even swatting executives and their families, all while notifying journalists and regulators… Read More »
BrianKrebs
太空探索技术公司的大胆布局:星链数据中心卫星如何重塑云计算经济格局
3 months 2 weeks ago
安全客
飞塔单点登录配置漏洞暴露企业认证系统核心安全隐患
3 months 2 weeks ago
安全客
签名盗用:“幻影窃取者”借虚假敦豪物流发票攻陷Java应用
3 months 2 weeks ago
安全客
Moltbook AI平台曝出高危漏洞,致邮箱地址、登录令牌及API密钥泄露
3 months 2 weeks ago
安全客
工业控制系统监控与数据采集漏洞引发拒绝服务攻击,或对工业生产运营造成中断影响
3 months 2 weeks ago
安全客
“修复”实为陷阱:ConsentFix钓鱼攻击借Azure CLI绕过多重身份验证
3 months 2 weeks ago
安全客
虚拟专用网络与虚假更新:谷歌捣毁大型IPIDEA代理网络
3 months 2 weeks ago
安全客
IIS服务器遭猛攻:UAT-8099组织部署区域锁定“BadIIS”恶意软件及Linux变体
3 months 2 weeks ago
安全客
INC
3 months 2 weeks ago
You must login to view this content
cohenido
ShinyHunters Expands Scope of SaaS Extortion Attacks
3 months 2 weeks ago
Following their attacks on Salesforce instances last year, members of the cybercrime group have broadened their targeting and gotten more aggressive with extortion tactics.
Elizabeth Montalbano, Contributing Writer
Akira
3 months 2 weeks ago
You must login to view this content
cohenido
Akira
3 months 2 weeks ago
You must login to view this content
cohenido
CVE-2026-0909 | WP ULike Plugin up to 4.8.3.1 on WordPress wp_ulike_delete_history_api ID resource injection
3 months 2 weeks ago
A vulnerability marked as problematic has been reported in WP ULike Plugin up to 4.8.3.1 on WordPress. This vulnerability affects the function wp_ulike_delete_history_api. This manipulation of the argument ID causes improper control of resource identifiers.
This vulnerability appears as CVE-2026-0909. The attack may be initiated remotely. There is no available exploit.
vuldb.com
CVE-2025-47398 | Qualcomm Snapdragon Auto up to WSA8845H use after free
3 months 2 weeks ago
A vulnerability labeled as critical has been found in Qualcomm Snapdragon Auto, Snapdragon CCW, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music and Snapdragon Wearables. This affects an unknown part. The manipulation results in use after free.
This vulnerability is reported as CVE-2025-47398. The attack requires a local approach. No exploit exists.
The affected component should be upgraded.
vuldb.com
Каучук из Гоби: Китай устал зависеть от импорта и решил выращивать шины прямо в песке
3 months 2 weeks ago
Теперь каучук растет там, где выживают только верблюды.
NSA Publishes New Zero Trust Implementation Guidelines
3 months 2 weeks ago
NSA released new guidelines to help organizations achieve target-level Zero Trust maturity