Aggregator
Невесомый властелин космоса: нейтрино оказалось легче, чем кто-либо мог представить
11 months ago
Даже электрон по сравнению с ним— как чёрная дыра!
Red Hat security advisory (AV25-210)
11 months ago
Canadian Centre for Cyber Security
STRIDE GPT:AI 驱动的威胁建模,筑牢应用安全防线
11 months ago
安全客
IBM security advisory (AV25-209)
11 months ago
Canadian Centre for Cyber Security
Linux Terminal Shortcuts
11 months ago
Linux Terminal Shortcuts
Dark Web Informer - Cyber Threat Intelligence
Dell security advisory (AV25-208)
11 months ago
Canadian Centre for Cyber Security
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
11 months ago
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors.
"The threat actor leverages fear-based lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link," Morphisec Labs researcher Nadav Lorber said in a report shared with The
The Hacker News
警惕!TROX Stealer 利用社会工程学实施数据盗窃
11 months ago
安全客
Akira
11 months ago
cohenido
Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking
11 months ago
Research by: hasherezade Key Points Introduction Process injection is one of the important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purposes such as: In our previous blog on process injections we explained the foundations of this topic and basic ideas behind detection and prevention. We also proposed a new technique dubbed Thread […]
The post Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking appeared first on Check Point Research.
SecWiki News 2025-04-14 Review
11 months ago
SecWiki周刊(第580期) by ourren
OneEval:大模型知识增强综合能力评测榜单 by ourren
Awesome-NTA: awesome papers, datasets and tools about network traffic analysis by ourren
更多最新文章,请访问SecWiki
OneEval:大模型知识增强综合能力评测榜单 by ourren
Awesome-NTA: awesome papers, datasets and tools about network traffic analysis by ourren
更多最新文章,请访问SecWiki
[Control systems] CISA ICS security advisories (AV25–207)
11 months ago
Canadian Centre for Cyber Security
Ubuntu security advisory (AV25-206)
11 months ago
Canadian Centre for Cyber Security
Tycoon 2FA 网络钓鱼工具包升级,终端防护面临挑战
11 months ago
安全客
辟谣!
11 months ago
正文昨天在开bp测试的时候,突然看到一个令人吃惊的消息:GitHub 疑似屏蔽了所有中国 IP 的访问。
HelloKitty 勒索软件重现,Windows、Linux 和 ESXi 环境安全告急
11 months ago
安全客
Meta to resume AI training on content shared by Europeans
11 months ago
Meta announced today that it will soon start training its artificial intelligence models using content shared by European adult users on its Facebook and Instagram social media platforms. [...]
Sergiu Gatlan
21% of security teams train just once a year—here’s how to fix that
11 months ago
In this blog, we'll explore the main reasons why security teams fall behind, what you can do to fix it, and how to build a culture of continuous learning.
The 'paste and run' phenomenon & OCSF standardization
11 months ago
Red Canary