Aggregator
Despite Russian influence, Moldova votes Pro-EU, highlighting future election risks
Despite Russian influence, Moldova votes Pro-EU, highlighting future election risks
SUSE Rancher Flaws Allow Attackers to Lock Out Admin Accounts
A critical security vulnerability in SUSE Rancher Manager has been discovered that enables attackers with elevated privileges to lock out administrative accounts, potentially disrupting entire Kubernetes cluster management operations. The flaw, tracked as CVE-2024-58260, carries a high severity rating with a CVSS score of 7.1. Vulnerability Overview The security issue stems from missing server-side validation on the username […]
The post SUSE Rancher Flaws Allow Attackers to Lock Out Admin Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Understanding your OT environment: the first step to stronger cyber security
CERT-AGID 20–26 settembre: phishing, malware e PEC compromesse
New ModStealer Evades Antivirus, Targets macOS Users to Steal Sensitive Data
A sophisticated new malware strain targeting macOS users has emerged, capable of bypassing traditional antivirus solutions while specifically targeting developers and cryptocurrency holders. The cross-platform threat, dubbed ModStealer, represents the latest evolution in macOS-focused cybercrime, highlighting the growing security challenges facing Apple users in 2024. ModStealer was first identified by cybersecurity firm Mosyle and reported through […]
The post New ModStealer Evades Antivirus, Targets macOS Users to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Бухгалтер открыл счёт-фактуру, а хакер — его рабочий стол. Маскировка удалась
Welcoming CERN to Have I Been Pwned
It's hard to explain the significance of CERN. It's the birthplace of the World Wide Web and the home of the largest machine ever built, the Large Hadron Collider. The bit that's hard to explain is, well, I mean, look at it!
Charlotte and
Welcoming CERN to Have I Been Pwned
A week in security (September 22 – September 28)
【附下载】2025我们身边的 网信安全 典型案例等 官方视频汇编
文本要点:
16+ 大类
28+小类
涵盖弱口令、视频会议系统、小程序、网络“开盒”、共享充电宝、诈骗“小黑盒”、穿戴设备、办公设备、扫描软件等等
案例:移动支付弱密码导致盗刷
案例拓展1:电脑锁屏密码破译原理解密
案例拓展2:认证安全级别排序
案例:部分网络视频会议系统服务器加密不彻底、云端文件不设防
三、APP、小程序
案例1:未经授权获取个人信息,引发电信诈骗
案例2:小程序漏洞造成个人信息泄露(医疗、教育领域)
案例拓展:个人防范方法及运营者法律责任
危害示例:电站被摧毁、企业数据被加密、工业控制系统瘫痪、医疗机构数据风险,医疗设备被控制、社交平台与电商平台数据泄露
示例拓展:普通网民和企业用户如何防范
案例:境外组织通过钓鱼邮件控制电脑、手机等终端,搜集情报,危害国家安全
案例:一个名字就可“开盒”5年内所有个人信息
案例:境外间谍情报机关和别有用心之人利用改装共享充电宝窃取公民个人隐私甚至国家秘密
案例拓展:充电宝窃密原理剖析及防范
危害示例:模拟陌生环境下,各式各样隐秘的偷拍偷录装置
案例:警方破获一起利用“AI换脸”技术实施的诈骗案
案例拓展:视频通话AI换脸演示及防范
案例:上海发生一起免费升级宽带 实为安装诈骗设备的案件
案例:境外黑客攻击小商店摄像头,从而监控港口
案例:境外间谍情报机关攻击个人穿戴等各种物联网设备,搜集情报
危害示例1:国家安全机关侦办案件中已发现多起通过改装办公设备实施窃密
危害示例2:复印机扫描仪等办公设备内置存储固件或模块存在泄密风险
危害示例3:打印机硒鼓内置的芯片可被改造用于存储打印过的信息,实施窃密
危害示例4:通过网络窃取办公设备中存储的打印、扫描等信息
案例:某机关工作人员违规使用互联网扫描软件扫描涉密会议纪要使该文件自动备份至网盘,导致3年间扫描的127份涉密文件泄露
案例:通过“闲聊”“AI”“社交媒体”造成泄密事件,已有多人因该泄密事件被处分
案例1:境外间谍情报机关通过非法窃取重点目标对象面容信息数据后窃密,危害国家安全
案例2:境外某企业将指纹支付系统直连公司数据库,遭黑客攻击,导致严重失泄密
案例3:某境外公司以发放加密货币代币为噱头在世界范围内扫描收集用户虹膜信息并将数据源转移
来源:重庆信通设计院天空实验室
【附下载】2025我们身边的 网信安全 典型案例等 官方视频汇编
非洲14国260名网恋诈骗嫌疑人落网
非洲14国260名网恋诈骗嫌疑人落网
Two Dutch Teenagers Arrested for Wi-Fi Sniffing Activities
Dutch authorities have arrested two 17-year-old boys on suspicion of “state interference” in a cybersecurity case with alleged connections to Russian espionage operations. The teenagers appeared in court on Thursday, with one remanded in custody and the other placed under strict home bail conditions pending a hearing scheduled within two weeks. Europol headquarters building in […]
The post Two Dutch Teenagers Arrested for Wi-Fi Sniffing Activities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Progressive Profiling Without Friction: Collecting Only What Helps
Learn how to use progressive profiling to collect user data without friction. Discover strategies for timing, consent, autofill, and local form design.
The post Progressive Profiling Without Friction: Collecting Only What Helps appeared first on Security Boulevard.
Progressive Profiling Without Friction: Collecting Only What Helps
How AI Can Predict and Prevent Security Breaches in Educational Platforms
Discover how AI helps educational platforms predict and prevent security breaches with real-time detection, predictive analytics, and automated response.
The post How AI Can Predict and Prevent Security Breaches in Educational Platforms appeared first on Security Boulevard.