Aggregator
7天Top 9:我如何让 Claude 手搓一个全自动 CTF 选手
Минус $3000000 за одно действие. Взлом Yearn Finance увеличил потери крипторынка до $127 млн.
CVE-2024-7096 | WSO2 Open Banking IAM SOAP Admin Services authorization (EUVD-2024-54612)
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
AlphaFold 如何改变世界
AlphaFold 如何改变世界
Wasabi Covert Copy strengthens cloud storage security
Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack. The selected data is logically air gapped and cannot be seen, accessed, modified or deleted, without multi-user authentication approval, protecting it from any type of malicious attack. Covert Copy strengthens and simplifies … More →
The post Wasabi Covert Copy strengthens cloud storage security appeared first on Help Net Security.
BlackFog releases ADX Vision to block data loss from unapproved AI use
BlackFog announced the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision gives organizations the visibility and control needed to manage AI securely. Operating directly on the device, it detects shadow AI activity, prevents unauthorized data movement in real time, and enforces governance policies automatically without disrupting productivity. The launch comes as organizations adopt AI tools to drive innovation and employees leverage LLMs to boost productivity. … More →
The post BlackFog releases ADX Vision to block data loss from unapproved AI use appeared first on Help Net Security.
Threat Actors Leveraging Matanbuchus Malicious Downloader to Ransomware and Establish Persistence
Matanbuchus represents a significant threat in the cybercriminal landscape as a dangerous malware downloader written in C++. Since 2020, this tool has been sold as Malware-as-a-Service, allowing threat actors to rent access and deploy it against targeted organizations. In July 2025, security researchers discovered version 3.0 operating in real-world attacks, marking a notable evolution in […]
The post Threat Actors Leveraging Matanbuchus Malicious Downloader to Ransomware and Establish Persistence appeared first on Cyber Security News.
五部门联合发文推进数据要素学科建设,全面加强数字人才体系构建
雷神众测漏洞周报2025.11.24-2025.11.30
FusterCluck PoC: Script Exploits RPC to Achieve Lateral Movement in Failover Clusters
FusterCluck is a POC script for attacking failover clusters via the cluster API over RPC. The tool allows
The post FusterCluck PoC: Script Exploits RPC to Achieve Lateral Movement in Failover Clusters appeared first on Penetration Testing Tools.
Morphisec enhances Anti-Ransomware Suite to block evasive attacks across key blind spots
Morphisec announced an expansion of its Anti-Ransomware Assurance Suite, adding new capabilities that include Network Share Ransomware Protection for Windows and Linux, Identity Risk Visibility, and enhancements to its existing EDR Tampering Protection. These updates strengthen enterprise defenses against the growing volume of undetectable ransomware, identity based breaches, and EDR evasion tactics. Morphisec’s latest innovations extend its prevention-first approach across critical blind spots: shared data resources, vulnerable identities and EDR visibility. These capabilities allow security … More →
The post Morphisec enhances Anti-Ransomware Suite to block evasive attacks across key blind spots appeared first on Help Net Security.
该来的还真来了:Let’s Encrypt 宣布证书有效期缩短至 45 天
Цена взлома — $1,22. Выручка — $4,6 млн. ИИ научился воровать криптовалюту практически бесплатно
新增攻击面:影子“小程序”
URGENT Patch: Google Fixes Two Actively Exploited Android Zero-Day Vulnerabilities
Two Android vulnerabilities were actively exploited as zero-days before patches became available, according to Google’s December Android Security
The post URGENT Patch: Google Fixes Two Actively Exploited Android Zero-Day Vulnerabilities appeared first on Penetration Testing Tools.
Glassworm Strikes Again: Third Wave of Malicious VS Code Extensions Bypasses Moderation
The Glassworm campaign targeting popular Visual Studio Code extensions has entered yet another phase — researchers are now
The post Glassworm Strikes Again: Third Wave of Malicious VS Code Extensions Bypasses Moderation appeared first on Penetration Testing Tools.