Aggregator
"Пожалуйста, приложите карту и введите PIN". Как вежливый зловред обворовывает пользователей их же руками
YouTube 证实禁止浏览器后台播放视频
Cyberattacks Disrupt Communications at Wind, Solar, and Heat Facilities in Poland
35 000 атак за месяц, скидки до 60%. Хакеры придумали, как заставить корпорации оплачивать работу чужих нейросетей
应急案例分享-利用UEMS作为远控
The Case for a Ransom Payment Ban and When It Might Happen
State CIO Group Seeks Federal Support for AI, Cybersecurity
State CIOs have lots on their plates, juggling multiple priorities from AI to cybersecurity. But the state IT programs don't have to go it alone. The National Association of State CIOs' 2026 agenda focuses on federal legislation - and federal funds - that could help state IT programs.
ASCF CTF
Date: Jan. 30, 2026, 9 a.m. — 31 Jan. 2026, 09:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.ascf.space/
Rating weight: 0
Event organizers: ASCF
58SRC 2025 年度 年终奖励
今晚7点直播 | 如何绕过路由器的认证机制?D-Link设备漏洞挖掘实战直播
强网杯S9 Real World - monotint
Не верь глазам своим. Почему первая строчка в Google больше не гарантирует, что вы заходите в свой онлайн-банк
AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems
AutoPentestX, an open-source automated penetration testing toolkit for Linux systems, enables comprehensive security assessments from a single command. Developed by Gowtham Darkseid and released in November 2025, it generates professional PDF reports while emphasizing safe, non-destructive testing. AutoPentestX targets Kali Linux, Ubuntu, and Debian-based distributions, automating OS detection, port scanning, service enumeration, and vulnerability checks. […]
The post AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems appeared first on Cyber Security News.
从“检测恶意”到“发现异常”:基于 Novelty Search 的威胁检测新范式
CVE-2026-1260 | Google Sentencepiece up to 0.2.1pre2 src/normalizer.cc DecodePrecompiledCharsMap memory corruption
Pear
You must login to view this content
SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations
A medium-severity vulnerability in the Iconics Suite SCADA system that could allow attackers to trigger denial-of-service conditions on critical industrial control systems. The flaw, tracked as CVE-2025-0921, affects supervisory control and data acquisition infrastructure widely deployed across automotive, energy, and manufacturing sectors. Vulnerability Overview CVE-2025-0921 stems from an execution-with-unnecessary-privileges weakness in multiple services within Mitsubishi […]
The post SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations appeared first on Cyber Security News.