Aggregator
【安全圈】浙江网安成功侦破无人机飞控破解案,两名嫌疑人落网
Мозговые волны — новая нефть. Власти решили защитить мысли граждан от иностранных спецслужб
ArcaneDoor Threat Actor Resurfaces in Continued Attacks Against Cisco Firewalls
Archer Health Data Leak Exposes 23GB of Medical Records
New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms
CloudSEK has uncovered a sophisticated Loader-as-a-Service botnet campaign spanning the last six months, leveraging exposed command-and-control logs to orchestrate attacks against SOHO routers, embedded Linux devices, and enterprise applications. The threat actors exploit unsanitized POST parameters—such as NTP, syslog, and hostname fields—alongside default credentials and known CVEs in WebLogic, WordPress, and vBulletin systems to achieve […]
The post New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
在笔记本电脑上模拟宇宙
在笔记本电脑上模拟宇宙
CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild
CISA has issued an Emergency Directive mandating immediate action to mitigate two critical zero-day vulnerabilities, CVE-2025-20333 and CVE-2025-20362, actively exploited against Cisco Adaptive Security Appliances (ASA) and select Firepower platforms. The vulnerabilities allow unauthenticated remote code execution and privilege escalation, enabling advanced threat actors to modify read-only memory (ROM) for persistence through reboot and system upgrades. Exploit Cisco ASA […]
The post CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild appeared first on Cyber Security News.
用AI改造SOAR!斗象SOC产品系列全新嵌入AI-SOAR Agent
用AI改造SOAR!斗象SOC产品系列全新嵌入AI-SOAR Agent
Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data
In late 2024, a new wave of cyber espionage emerged targeting global telecommunications infrastructure. Operating under the moniker Salt Typhoon, this Chinese state-sponsored group has focused its efforts on routers, firewalls, VPN gateways, and lawful intercept systems within major telecom providers. By embedding bespoke firmware implants and leveraging living-off-the-land binaries, Salt Typhoon has achieved persistent […]
The post Chinese State-Sponsored Hackers Attacking Telecommunications Infrastructure to Harvest Sensitive Data appeared first on Cyber Security News.