Aggregator
【安全圈】Cloudflare 隧道被滥用,AsyncRAT 威胁企业数据安全
【安全圈】Magecart 攻击升级:电商平台支付信息遭高度混淆代码窃取
【安全圈】新型恶意软件伪装网络更新 俄多领域机构遭高级持续攻击
【安全圈】微软发布"安全未来计划"重大进展报告 打造史上最大规模网络安全工程
Three Reasons Why the Browser is Best for Stopping Phishing Attacks
How Threat Intelligence Feeds Help During Incident Response
When data meets automation, two pillars of modern tech converge to create something smarter: Threat Intelligence Feeds. Real-time insights, machine-speed decisions, and a global perspective — all working together to outsmart threats before they become incidents. ANY.RUN’s TI Feeds are structured, continuously updated streams of fresh threat data. They contain network-based IOCs — IP addresses, […]
The post How Threat Intelligence Feeds Help During Incident Response appeared first on ANY.RUN's Cybersecurity Blog.
CVE-2025-21204:Windows Update Stack 漏洞可致恶意代码执行及权限提升
Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp
Сыграй в бету — отдай пароли: новая ловушка для геймеров
Сокрушить врага в MTG одним ударом? Сначала реши задачу, над которой математики бьются 175 лет
重大升级| SecGPT V2.0:打造真正“懂安全”的大模型
QEMU 10.0 释出
TP-Link 路由器漏洞可致攻击者注入恶意 SQL 命令,用户数据面临泄露风险
Staatssecretaris wil AI inzetten voor oorlogsvoering
英国零售巨头马莎百货疑遭网络攻击,门店电子支付服务中断
泄露近50万患者健康信息,知名眼科医疗集团赔偿超2600万元
Bijzondere koninklijke onderscheiding voor Rob Bauer
Attackers phish OAuth codes, take over Microsoft 365 accounts
Suspected Russian threat actors are using OAuth-based phishing attacks to get targets to grant them access to their Microsoft 365 (M365) accounts. “The primary tactics observed involve the attacker requesting victim’s supply Microsoft Authorization codes, which grant the attacker with account access to then join attacker-controlled devices to Entra ID (previously Azure AD), and to download emails and other account-related data,” according to Volexity researchers. How the attack unfolds These recently observed attacks rely heavily … More →
The post Attackers phish OAuth codes, take over Microsoft 365 accounts appeared first on Help Net Security.