Aggregator
诚邀渠道合作伙伴共启新征程
火绒小问答 ——「个人版」功能使用类top问题解答
Microsoft to Kill RC4 in Kerberos by 2026
Microsoft will disable RC4 by default in Windows Kerberos, pushing organizations to uncover and eliminate longstanding cryptographic weaknesses hidden in legacy authentication systems - particularly within large domains where fallback to RC4 has quietly persisted for decades.
Medical Group Will Pay $1.2M to Settle Data Theft Lawsuit
A Kansas medical group will pay $1.2 million to settle proposed class action litigation involving an attack that compromised the sensitive data of nearly 256,000 individuals. The Rhysida ransomware operation claimed responsibility and said it stole 3 terabytes.
Why State CIOs Are Betting on AI
According to the National Association of State CIOs, this year AI tech - including generative and agentic AI - is the top strategic initiative for state CIOs - marking an "unprecedented" shift in IT priorities, said NASCIO Executive Director Doug Robinson. In fact, AI first appeared on the organization's annual survey of state and territory CIOs just three years ago.
Echo Secures $35M to Tackle Cloud Vulnerabilities With AI
Cloud security startup Echo has closed a $35 million Series A funding round to boost development of its AI-native OS. The platform starts with secure container images and aims to extend to VMs and libraries, helping enterprises minimize risk from open-source software.
多家中国火箭公司尝试复制 SpaceX 的 Starship 火箭
特朗普选定资深特战军官担任下任美国网络司令部司令
音乐流媒体巨头遭网络攻击,近三千万用户数据泄露
理解真正的Programmatic Tool Calling
Доверяй, но проверяй (орфографию). Лишняя буква в названии пакета стоила разработчикам всех сбережений
工程中心参编的《数据安全技术 电子产品信息清除技术要求》强制性国家标准将于2027年1月1日起正式实施
Trellix advances NDR to close the OT-IT threat detection-to-response gap
Trellix announced Trellix NDR innovations, strengthening OT-IT security with integrated visibility across complex environments, enhanced detection capabilities, and automated investigation and response to reduce the threat detection-to-response gap. “We know cybercriminals are increasingly targeting the OT-IT boundary, where threats can hide in the absence of complete visibility,” said Rohit Unnikrishnan, SVP Product Management, Trellix. “To keep pace, organizations must prioritize proactive defense with enhanced perimeter visibility and enriched intelligence extending across environments for greater resilience … More →
The post Trellix advances NDR to close the OT-IT threat detection-to-response gap appeared first on Help Net Security.
CVE-2025-43541 | WebKitGTK/WPE WebKit up to 2.50.3 Web type confusion
CVE-2025-43536 | WebKitGTK/WPE WebKit up to 2.50.3 Web use after free
CVE-2025-43535 | WebKitGTK/WPE WebKit up to 2.50.3 Web memory corruption
CVE-2025-43531 | WebKitGTK/WPE WebKit up to 2.50.3 Web race condition
CVE-2025-43501 | WebKitGTK/WPE WebKit up to 2.50.3 Web buffer overflow
XM Cyber bridges external attack surface management with validated internal attack paths
XM Cyber announced an update to its platform that connects External Attack Surface Management with internal risk validation, closing the gap between what’s exposed outside and what exists inside. XM Cyber allows security teams to instantly see not just what is externally exposed, but also gain a strategic view on how external exposures chain together with internal, exploitable vulnerabilities to threaten critical business assets. These enhancements provide a seamless, end-to-end approach, using validated exploitable attack … More →
The post XM Cyber bridges external attack surface management with validated internal attack paths appeared first on Help Net Security.