Aggregator
Ваш пароль «1111»? Поздравляем, вы, возможно, стали звездой зарубежного порносайта
国际 | 韩国多部门联动遏制青少年网络性犯罪
关注 | 最高法发布依法惩治涉民生领域诈骗犯罪典型案例
专家解读 | 时建中:提升数据流通安全治理能力 促进数据流通开发利用
专题·低空经济安全 | 面向低空经济的5G网联无人机全域防护体系解析
CVE-2025-49643 | Zabbix up to 6.0.41/7.0.18/7.2.12/7.4.2 Parameter /imgstore.php amplification (EUVD-2025-199985)
Removing Barriers to Digital Transformation
CVE-2025-61260 — OpenAI Codex CLI: Command Injection via Project-Local Configuration
By: Isabel Mill & Oded Vanunu OpenAI Codex CLI is OpenAI’s command-line tool that brings AI model-backed reasoning into developer workflows. It can read, edit, and run code directly from the terminal, making it possible to interact with projects using natural language commands, automate tasks, and streamline day-to-day development One of its key features is […]
The post CVE-2025-61260 — OpenAI Codex CLI: Command Injection via Project-Local Configuration appeared first on Check Point Research.
Evil Twin Wi‑Fi Hacker Jailed for Stealing Data Mid‑Flight
Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally
The Tomiris hacker group has resurfaced with a sophisticated campaign targeting foreign ministries and government entities worldwide. Beginning in early 2025, this advanced persistent threat (APT) actor shifted its operational strategy to focus on high-value diplomatic infrastructure. By leveraging a diverse array of programming languages—including Go, Rust, C/C++, and Python—the group has enhanced its ability […]
The post Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally appeared first on Cyber Security News.
Radar
You must login to view this content
Никаких «бэкдоров». Разработчики GrapheneOS разрывают контракт с крупнейшим хостером Европы
Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings
Terra Security introduces continuous exploitability validation for CTEM programs
Terra Security announced new capabilities for security and engineering leaders seeking to operationalize Continuous Threat Exposure Management (CTEM), enabling them to determine whether newly disclosed vulnerabilities are exploitable in their own environments. Recent vulnerabilities discovered in major application frameworks, including ORM layers, routing systems, and serialization pipelines, have revealed a systemic issue facing cybersecurity programs: organizations can detect vulnerabilities at scale but cannot validate exploitability at scale. As web applications grow more dynamic and interconnected, … More →
The post Terra Security introduces continuous exploitability validation for CTEM programs appeared first on Help Net Security.
Data breach hits 'South Korea's Amazon,' potentially affecting 65% of country’s population
⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
树莓派因为内存价格飙升而涨价
Cryptomixer crypto laundering service taken down by law enforcement
German and Swiss law enforcement agencies have taken down Cryptomixer, an illegal cryptocurrency mixer service, and have confiscated over 25 million euros (approximately $29 million) in Bitcoin. The Cryptomixer seizure banner As part of Operation Olympia, and with support from the EU’s Europol and Eurojust, the agencies have seized three servers in Zurich, Switzerland and the cryptomixer.io domain, on which they plastered a warning: “Law enforcement agencies have seized databases and other information relating to … More →
The post Cryptomixer crypto laundering service taken down by law enforcement appeared first on Help Net Security.