Aggregator
DOJ Seizes $2.8 Million, Indicts Alleged Zeppelin Ransomware Operator
U.S. authorities seized $2.8 million crypto and $70,000 from Ianis Aleksandrovich Antropenko, who they say used the Zeppelin ransomware to attack companies in the United States and elsewhere and then laundered the cryptocurrency used to pay the ransoms through a crypto mixer and by exchanging it for cash.
The post DOJ Seizes $2.8 Million, Indicts Alleged Zeppelin Ransomware Operator appeared first on Security Boulevard.
Microsoft: Recent Windows updates may fail to install via WUSA
【安全圈】俄罗斯黑客组织 EncryptHub 利用 MSC EvilTwin 漏洞部署 Fickle Stealer 恶意软件
【安全圈】Windows 11 24H2 安全更新引发 SSD/HDD 故障与潜在数据损坏
【安全圈】研究发现数百个 TeslaMate 部署泄露特斯拉车主敏感数据
【安全圈】知名HR软件Workday遭数据泄露,第三方系统被攻陷
New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They are mainly targeting mobile payment services such as Apple Pay and Google Pay. This attack vector involves relaying stolen payment card credentials from compromised devices to mules’ burner phones, enabling […]
The post New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
专访黑客行者玄道:俯瞰星海,循道苍穹【T00ls人物专访第十二期】
Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks
大众想要司机支付月费以解锁更高的动力
12Storeez, «Неофарм» и «Аэрофлот»: громкие атаки лета станут темой CyberLink Conf в Москве.
Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code
A critical security vulnerability has been discovered in Rockwell Automation’s ControlLogix Ethernet communication modules, potentially allowing remote attackers to execute arbitrary code on industrial control systems. The vulnerability, tracked as CVE-2025-7353, affects multiple ControlLogix Ethernet modules and carries a maximum CVSS score of 9.8, indicating severe security implications for industrial automation environments. Key Takeaways1. Critical […]
The post Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.
What is Use-After-Free Vulnerability? – Impact and Mitigation
Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like C and C++. These vulnerabilities occur when a program continues to use a memory location after it has been freed, creating opportunities for attackers to manipulate program execution flow, corrupt […]
The post What is Use-After-Free Vulnerability? – Impact and Mitigation appeared first on Cyber Security News.
【复现】SmartBi远程代码执行漏洞风险通告
奇安信斩获首届CCF智能汽车大赛“汽车安全攻防赛”一等奖
Sandy Coast: explosieven verwijderen en kabels beschermen
DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching
Winners of DARPA’s AI Cyber Challenge proved AI can automate patching at scale. Their tools will go open source, offering defenders new power—but also raising concerns about AI-fueled exploits.
The post DARPA AI Cyber Challenge Winners Impress With Quick, Scalable Patching appeared first on Security Boulevard.