Aggregator
CVE-2025-45582 | GNU Tar up to 1.35 TAR Archive path traversal (EUVD-2025-21178 / Nessus ID 281751)
HGAME2026 WEEK1 解题思路
BeyondTrust warns of critical RCE flaw in remote support software
16 ИИ-агентов Claude, две недели и $20 000. Как искусственный интеллект написал компилятор C и собрал ядро Linux
⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More
9th February – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 9th February, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Romania’s national oil pipeline operator, Conpet, has suffered a cyberattack that disrupted its IT systems and took its website offline. The company said operational technology, including pipeline control and telecommunications systems, remained […]
The post 9th February – Threat Intelligence Report appeared first on Check Point Research.
Hackers Use Signal QR Codes to Spy on Military and Political Leaders
Attackers abuse SolarWinds Web Help Desk to install Zoho agents and Velociraptor
NASA 允许宇航员携带智能手机去月球
20 лет разработки, 50 патентов и первый реальный полет. Как Китай решил задачу, над которой бились авиаконструкторы всего мира
CVE-2026-2246 | AprilRobotics apriltag up to 3.4.5 apriltag.c apriltag_detector_detect memory corruption (Issue 422)
Microsoft Exchange Online Flags Customers Legitimate Email as Phishing
Microsoft Exchange Online is experiencing a service degradation that incorrectly flags legitimate customer emails as phishing, quarantining them and disrupting communications. The issue, identified as EX1227432, started on February 5, 2026, at 10:31 AM EST and remains ongoing. Microsoft classifies this as an incident affecting Exchange Online, with some users unable to send or receive […]
The post Microsoft Exchange Online Flags Customers Legitimate Email as Phishing appeared first on Cyber Security News.
Hackers Exploit Legitimate Apple and PayPal Invoice Emails in DKIM Replay Attacks
Cybersecurity threats are swiftly evolving beyond easily spotted, poorly written phishing emails to sophisticated methods that leverage trusted digital infrastructure. Attackers are now exploiting legitimate business workflows within widely used platforms, effectively turning reputable services into unwitting accomplices for financial fraud. This strategic shift makes malicious communications significantly harder for traditional security filters to detect, […]
The post Hackers Exploit Legitimate Apple and PayPal Invoice Emails in DKIM Replay Attacks appeared first on Cyber Security News.