Aggregator
【在野利用】Dify Docker部署仍存在React2Shell风险
New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
A sophisticated new phishing kit called GhostFrame has already been used to launch over 1 million attacks. First discovered in September 2025 by Security researchers at Barracuda, this stealthy tool represents a dangerous evolution in phishing-as-a-service technology. What makes GhostFrame particularly concerning is its simplicity combined with effectiveness. Unlike traditional phishing kits, GhostFrame uses an […]
The post New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide appeared first on Cyber Security News.
派拉蒙对华纳发起敌意收购
INE Earns G2 Winter 2026 Badges Across Global Markets
Cary, North Carolina, USA, December 4th, 2025, CyberNewsWire Cybersecurity and IT training platform maintains Leader and Momentum Leader positions while expanding regional excellence INE has been recognized with seven G2 Winter 2026 badges, underscoring its continued leadership in online course delivery, technical skills development, and cybersecurity education. This season’s awards include Leader status in the […]
The post INE Earns G2 Winter 2026 Badges Across Global Markets appeared first on Cyber Security News.
Освойте два этих навыка, если хотите, чтобы рекрутеры сами за вами бегали
CVE-2025-59029 | PowerDNS 5.3.0/5.3.1 denial of service
FBI Warns of Hackers Altering Photos Found on Social Media to Use as Fake Proof
A new alert warns people about a growing scam that uses altered photos to trick families into paying fake ransom demands. In a notice titled Alert Number: I-120525-PSA, dated December 5, 2025. The FBI explains that criminals are taking photos from social media and other public sites and altering them. Then, they are used as […]
The post FBI Warns of Hackers Altering Photos Found on Social Media to Use as Fake Proof appeared first on Cyber Security News.
CVE-2025-65798 | usememos 0.25.2 Attachment access control (EUVD-2025-201726)
CVE-2025-60912 | phpIPAM 1.7.3 HTTP generate-mysql.php cross-site request forgery (EUVD-2025-201713)
CVE-2025-61318 | Emlog Pro 2.5.20 admin/template.php path traversal (EUVD-2025-201728)
Akira
You must login to view this content
Akira
You must login to view this content
Akira
You must login to view this content
Akira
You must login to view this content
【哈希值(电子数据指纹)的属性特征、计算方法、强大功能及误解澄清】
【实操Windows 系统密码应急绕过】
Marquis Software Breach Affects Over 780,000 Nationwide
SecWiki News 2025-12-08 Review
更多最新文章,请访问SecWiki
Defense bill addresses secure phones, AI training, cyber troop mental health
The compromise legislation has other cyber provisions besides on commercial spyware, joint NSA-Cyber Command leadership and streamlining regulations.
The post Defense bill addresses secure phones, AI training, cyber troop mental health appeared first on CyberScoop.