Aggregator
中文互联网基础语料3.0正式发布
Absolute Security Rehydrate restores compromised endpoints
Absolute Security released Rehydrate, empowering enterprises to recover from IT or cyber incidents remotely and at scale to minimize operational downtime. Enterprises with business operations that have been stopped by Windows PCs made inoperable by cyberattacks, ransomware strikes, and IT incidents can use this innovation to automate the at-scale restoration of connected devices to a fully operational state, typically in 30 minutes or less, remotely and with a single click. “Ransomware attacks, security breaches, and … More →
The post Absolute Security Rehydrate restores compromised endpoints appeared first on Help Net Security.
Хотите стать хакером? Теперь для этого есть удобное приложение с галочками. Просто выберите, что украсть.
Malicious Typosquatted PyPI Packages Spreading SilentSync RAT
On August 4, 2025, Zscaler ThreatLabz uncovered two malicious Python packages—sisaws and secmeasure—that deliver SilentSync, a Python-based remote access trojan (RAT), to unsuspecting developers. Both packages leverage typosquatting to impersonate legitimate libraries in the Python Package Index (PyPI), posing a serious supply-chain risk to projects that install them. SilentSync’s versatile capabilities include remote command execution, […]
The post Malicious Typosquatted PyPI Packages Spreading SilentSync RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ping Identity debuts AI framework to keep humans in control
Ping Identity announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every digital interaction, helping enterprises unlock frictionless convenience, strengthen governance, and open new channels for growth. “We can no longer implicitly trust what we see, hear, or receive digitally,” said Peter Barker, CPO at Ping Identity. “As AI becomes … More →
The post Ping Identity debuts AI framework to keep humans in control appeared first on Help Net Security.
Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network
The newly publicized Pixie Dust attack has once again exposed the critical vulnerabilities inherent in the Wi-Fi Protected Setup (WPS) protocol, enabling attackers to extract the router’s WPS PIN offline and seamlessly join the wireless network. By targeting weak randomization in the registrar’s nonces, this exploit subverts the intended security of WPS without requiring proximity […]
The post Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network appeared first on Cyber Security News.
谷歌修复 Chrome 零日漏洞,V8 引擎活跃漏洞威胁数百万用户
小鹏汇天两辆飞行汽车在长春航展上相撞
TP-Link Router 0-Day RCE Vulnerability Exploited Bypassing ASLR Protections – PoC Released
A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2025-9961, has been discovered in TP-Link routers. Security research firm ByteRay has released a proof-of-concept (PoC) exploit, demonstrating how attackers can bypass Address Space Layout Randomization (ASLR) protections to gain full control over affected devices. The vulnerability resides in the router’s Customer Premises Equipment (CPE) […]
The post TP-Link Router 0-Day RCE Vulnerability Exploited Bypassing ASLR Protections – PoC Released appeared first on Cyber Security News.
Windows Greenshot Vulnerability Lets Attackers Execute Malicious Code – PoC Published
A critical security vulnerability in the popular Greenshot screenshot utility has been discovered that allows local attackers to execute arbitrary malicious code within the trusted application process. The vulnerability, tracked as CVE-2025-59050, affects Greenshot versions up to 1.3.300 and has been patched in version 1.3.301 released on September 16, 2025. Greenshot image editor interface showing capture […]
The post Windows Greenshot Vulnerability Lets Attackers Execute Malicious Code – PoC Published appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
聚焦国家网络安全宣传周:关键网络安全知识,一文读懂!
GNOME 49 释出
Запасной парашют для бизнеса: автоматизируем процессы обеспечения непрерывности деятельности. 25 сентября, начало в 11:00
TC260-004《政务大模型应用安全规范》发布
网络犯罪组织WhiteCobra植入24款恶意扩展程序 瞄准VSCode、Cursor及Windsurf用户
Behind the scenes of cURL with its founder: Releases, updates, and security
In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure across billions of devices, from cloud services to IoT. He shares insights into cURL’s decades-long journey of testing, reviewing, and refining its code to minimize risks. Stenberg also explains the team’s approach to handling vulnerabilities, ensuring transparency, and maintaining trust in the open-source ecosystem. cURL is embedded in billions of devices, from cloud services to … More →
The post Behind the scenes of cURL with its founder: Releases, updates, and security appeared first on Help Net Security.