Aggregator
密码保护:羊城杯WEB tomtom2记录
月度安全态势:8月最值得关注的网络安全动态
Seeking a Job in Cybersecurity? Protect Yourself From Scams
The demand for skilled cybersecurity professionals, coupled with the rise in remote work, has led to an increase in fraudulent job postings targeting tech-savvy individuals. Learn why this is so and how to protect yourself from deceptive schemes as you pursue a job in cybersecurity.
Nothing to Smile About: Hacks on Dental Practices Swell
Some dentists don't have much to smile about these days when it comes to cyberattacks. More than 1.2 million of their patients have had their sensitive data compromised in at least two dozen hacks and other breaches so far in 2024, including several incidents reported in the past month.
Cisco Bolsters AI Security by Buying Robust Intelligence
Cisco announced its intent to acquire Robust Intelligence to fortify the security of AI applications. With this acquisition, Cisco aims to address AI-related risks, incorporating advanced protection to guard against threats such as jailbreaking, data poisoning and unintentional model outcomes.
True Zero Trust Should Mean VPN Retirement
Microsoft Copilot Fixes ASCII Smuggling Vulnerability
Microsoft says it fixed a security flaw in artificial intelligence chatbot Copilot that enabled attackers to steal multifactor authentication code using a prompt injection attack. Security researcher Johann Rehberger said he discovered a way to invisibly force Copilot to send data.
OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike
OperatorsKit This repository contains a collection of Beacon Object Files (BOFs) that integrate with Cobalt Strike. Kit content The following tools are currently in the OperatorsKit: Name Description AddExclusion Add a new exclusion to...
The post OperatorsKit: Collection of Beacon Object Files (BOF) for Cobalt Strike appeared first on Penetration Testing Tools.
TelecordC2: An advanced cross-platform C2 using Discord and Telegram api
TelecordC2 Telecord is an advanced cross-platform c2 using discord and Telegram API, it allows multi-agent handling with ease using Telegram and discord APIs can be good for exfiltration and network evasion, this project is...
The post TelecordC2: An advanced cross-platform C2 using Discord and Telegram api appeared first on Penetration Testing Tools.
Subdominator: Unleash the Power of Subdomain Enumeration
Subdominator – Unleash the Power of Subdomain Enumeration Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential...
The post Subdominator: Unleash the Power of Subdomain Enumeration appeared first on Penetration Testing Tools.
Google 再提高 Chrome 漏洞赏金数额,最高可达25万美元
South Korean APT Exploits 1-Click WPS Office Bug, Nabs Chinese Intel
OpenAI 敲定新融资,估值超千亿美元;英伟达盈利大涨 168%,股票跌 7%;1/4 年轻人从不接电话:没这习惯|极客早知道
半夜加班,突然有人和我抢鼠标
.NET 安全基础入门学习知识库
2024hvv | 33套.NET系统漏洞威胁情报(08.29更新)
.NET 一款支持反序列化漏洞的白名单工具
National Public Data (NPD) Breach: Essential Guide to Protecting Your Identity
The recent National Public Data (NPD) breach stands as one of the largest social security number (SSN) exposures in history. With reports suggesting potential compromises affecting up to 3 billion SSNs, it is crucial to understand the scope of the breach and take immediate steps to protect yourself from identity theft. This guide provides an …
The post National Public Data (NPD) Breach: Essential Guide to Protecting Your Identity appeared first on Security Boulevard.
Seeking a Job in Cybersecurity? Protect Yourself From Scams
The demand for skilled cybersecurity professionals, coupled with the rise in remote work, has led to an increase in fraudulent job postings targeting tech-savvy individuals. Learn why this is so and how to protect yourself from deceptive schemes as you pursue a job in cybersecurity.