Aggregator
DEF CON 33: One Modem To Brick Them All -Vulns In EV Charging Comms
Creators, Authors and Presenters: Jan Berens, Marcell Szakaly
Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference's events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 33: One Modem To Brick Them All -Vulns In EV Charging Comms appeared first on Security Boulevard.
Cyberattack Disrupts Airport Check-In Systems Across Europe
奥地利军方从 MS Office 切换到 LibreOffice
CISA warns of malware deployed through Ivanti EPMM flaws
Два подростка — сотни взломов. Но один арест прервал каскад вымогательских атак
软件测试顶会ISSTA 2025 论文清单与摘要(补遗)
First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Ransomware Code
AI-powered malware, known as ‘MalTerminal’, uses OpenAI’s GPT-4 model to dynamically generate malicious code, including ransomware and reverse shells, marking a significant shift in how threats are developed and deployed. This discovery follows the recent analysis of PromptLock, another AI-driven malware, indicating a clear trend toward adversaries weaponizing large language models (LLMs). This discovery was […]
The post First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Ransomware Code appeared first on Cyber Security News.
小米将远程修复其 11 万辆 SU7 的辅助驾驶系统缺陷
Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors. According to recent data, more than 23,600 vulnerabilities were published in the first half of 2025 alone, representing a 16% increase over 2024. This alarming trend has seen sophisticated threat actors, including nation-state groups and […]
The post Top Zero-Day Vulnerabilities Exploited in the Wild in 2025 appeared first on Cyber Security News.