Aggregator
派早报:广电总局发布「AI 魔改」管理提示,itch.io 遭 AI 举报下线等
数智领航丨构建全场景智能化中小学校园网络
FreeBuf早报 | FBI建议用暗号戳穿语音克隆骗局;印度制药巨头遭到黑客攻击
更好的安全实践,解决Copilot + CodeQL 的各类安全左移局限性问题
喜讯:锦行科技项目成果荣获“2024年中国通信学会科学技术奖二等奖”!
Temu 和 SHEIN 在越南被停止业务
Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins
Cybercriminals online take advantage of well-known events to register malicious domains with keywords related to the event, with the intention of tricking users through phishing and other fraudulent schemes. The analysis examines event-related abuse trends across domain registrations, DNS and URL traffic, active domains, verdict change requests, and domain textual patterns, with specific examples from […]
The post Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Mandiant 称,5000 万美元加密货币盗窃案与朝鲜黑客有关
德勤否认数据泄露,称 Brain Cipher 网络攻击影响了客户系统
New Meeten Malware Attacking macOS And Windows Users To Steal Logins
A sophisticated crypto-stealing malware, Realst, has been targeting Web3 professionals, as the threat actors behind this campaign have employed AI-generated content to create fake companies, such as “Meetio,” to appear legitimate. By tricking victims into participating in video calls, cybercriminals can convince them to download a malicious meeting application from a compromised website. Once installed, […]
The post New Meeten Malware Attacking macOS And Windows Users To Steal Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Funksec
pwnobd: Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices
pwnobd Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices. Adding new functionality Most functionality is dynamically registered onto pwnobd through the use of decorators. Attacks Located in src/pwnobd/modules/attacks/. See...
The post pwnobd: Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices appeared first on Penetration Testing Tools.
cemu: lightweight multi-architecture assembly playground
cemu Writing assembly is fun. Assembly is the lowest language (humanly understandable) available to communicate with computers, and is crucial to understand the internal mechanisms of any machine. Unfortunately, setting up an environment to...
The post cemu: lightweight multi-architecture assembly playground appeared first on Penetration Testing Tools.
最新发现绕过浏览器隔离技术的攻击方法
bincat: Binary code static analyser, with IDA integration
What is BinCAT? A static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA. It features: value analysis (registers and memory) taint analysis type reconstruction and propagation backward and forward analysis In action...
The post bincat: Binary code static analyser, with IDA integration appeared first on Penetration Testing Tools.
Mauri Ransomware Leverages Apache ActiveMQ Vulnerability to Deploy CoinMiners
The Apache ActiveMQ server is vulnerable to remote code execution (CVE-2023-46604), where attackers can exploit this vulnerability by manipulating serialized class types in the OpenWire protocol to load malicious class configurations from external sources. Successful exploitation allows attackers to execute arbitrary code on the vulnerable server, leading to potential system compromise, which has been actively […]
The post Mauri Ransomware Leverages Apache ActiveMQ Vulnerability to Deploy CoinMiners appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Target Android Users via WhatsApp to Steal Sensitive Data
Researchers analyzed a malicious Android sample created using Spynote RAT, targeting high-value assets in Southern Asia, which, likely deployed by an unknown threat actor, aims to compromise sensitive information. Although the target’s precise location and nature have not been disclosed, its high-value nature suggests that advanced persistent threat (APT) groups may be interested in it. […]
The post Hackers Target Android Users via WhatsApp to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ransomware attack hits leading heart surgery device maker
【附下载】2024数据安全 重大案例 官方视频 汇编
来源:重庆信通设计院天空实验室
本期摘要
文本要点:
16+ 大类
30+小类
涵盖医疗、生态、气象、测绘、软件开发、交通、地理、太空、外交、动画等多个领域
要点目录
一、弱口令类
案例1:运维测试账号未删除,内部数据在境外论坛被公开叫卖
案例2:对外公用邮箱维护不当,邮件数据被窃取
案例3:港口监控弱口令,导致目标海域被监控
二、头部企业类
案例1:14亿条腾讯用户数据被盗?有黑客公开称已窃取500GB数据库,腾讯回应称信息不实。专家指出,在AI技术下,历史数据安全风险仍然较大
三、生态领域
案例1:假借学术合作,窃取生态数据
案例2:拉拢引诱人员,窃取自然保护区各类数据
案例3:负责研发和运维的第三方公司违规采集、存储、处理生态环境相关数据
四、个人信息类
案例1:安徽合肥警方侦破特大侵犯公民个人信息案 贩卖个人信息超百万条
五、气象领域
案例1:数百非法气象站点被査处,向境外传输数据
六:医疗领域
案例1:西安警方侦破首例破坏医院计算机信息系统案
案例2:私自开发抢号软件牟利
案例3:窃取医院数据牟利
案例4:上海三甲医院医生泄露患者隐私信息,涉及211名患者信息和2人的裸照
案例5:医务人员泄露病患信息,被行政拘留
七、不正当竞争类
案例1:国内首例!涉数据抓取交易不正当竞争纠纷案终审宣判
八、黑客攻击类
案例1:招聘APP遭黑客攻击,300万条数据泄露
案例2:南昌某集团网络设备疑似被黑客远程控制,向境外传输大量数据
案例3:湖南某信息技术公司未履行数据安全保护义务被处罚
九、测绘领域
案例1:以合作为由,境外势力非法采集我国原始测绘数据
十、软件开发领域
案例1:境外组织通过SDK搜集我用户数据和个人信息
十一、交通领域
案例1:某国内信息公司为境外公司非法采集我国铁路数据
十二、地理空间领域
案例1:境外地图公司诱使境内人员地图“打卡”,非法采集敏感地理空间信息数据
十三、太空领域
案例1:提防“太空间谍”,我网民为间谍卫星“指路”
案例2:境外对我太空领域关键技术和数据的泄窃密风险
十四、航空领域
案例1:航空爱好者莫变为“窃密志愿者”
十五、外交领域
案例1:美国诬称中方购买美公民敏感数据
案例2:美调查中国联网汽车,言必称安全
十六:动画类
动画一:“安仔说国家安全”—— 数据安全篇
案例1:海事、航空领域,被诱骗安装AIS陆基基站(用于搜集船舶数据)、ADS_B信号接收设备(用于搜集飞机数据)
案例2:以咨询调查公司名义,搜集金融、生物、航运等领域信息
动画二:数据泄露:内部人员操作不当、网络攻击以及内鬼窃取
动画三:数据安全意识科普
动画四:小区数据大泄露
动画五:黑猫警长——数据安全篇
来源:重庆信通设计院天空实验室