Aggregator
Pornhub 继 OpenAI 后曝数据泄露,浏览记录等 2.01 亿条会员信息被窃取
JVN: Siemens製品に対するアップデート(2025年12月)
JVN: 富士電機製V-SFT-6における複数の脆弱性
«Чтобы не бояться вести детей на улицу». В РФ предложили пускать в соцсети только с 16 лет (и заблокировать WhatsApp)
JVN: 複数のJohnson Controls製品における複数の脆弱性
Просто захотелось водичку потеплее. Хакеры «атаковали» городской фонтан в Нидерландах
嘶吼安全快报—2025.12.17
MITRE发布2025年度TOP25最危险软件弱点榜单
Zabbix: Open-source IT and OT observability solution
Zabbix is an open source monitoring platform designed to track the availability, performance, and integrity of IT environments. It monitors networks along with servers, virtual machines, applications, services, databases, websites, and cloud resources. For cybersecurity professionals, this visibility matters because operational issues and security incidents often overlap. Early signs of compromise can surface as performance changes, service failures, or unusual system behavior that monitoring tools detect first. At its core, Zabbix collects data from many … More →
The post Zabbix: Open-source IT and OT observability solution appeared first on Help Net Security.
BlindEagle Hackers Attacking Organization to Abuse Trust and Bypass Email Security Controls
In a sophisticated cyberespionage campaign, the BlindEagle threat actor has once again targeted Colombian government institutions. This latest operation specifically zeroed in on an agency under the Ministry of Commerce, Industry, and Tourism, leveraging a highly effective strategy to bypass standard email security protocols. By compromising an internal email account within the target organization, the […]
The post BlindEagle Hackers Attacking Organization to Abuse Trust and Bypass Email Security Controls appeared first on Cyber Security News.
ИИ, боты и постквантовая защита. Cloudflare подвёл итоги 2025 года
How exposure management changes cyber defense
In this Help Net Security video, Larry Slusser, VP of Strategy at SixMap, explains why endpoint detection and response is only part of the security story. Drawing on his work as an incident responder, engagement manager, and ransomware negotiator, he describes EDR as the armed guard that reacts after an intruder crosses the line. Slusser then shifts to proactive exposure management. He explains how attackers map organizations from the outside by identifying domains, IP addresses, … More →
The post How exposure management changes cyber defense appeared first on Help Net Security.
Сдай соседа — получи $30 тысяч. Иранские хакеры объявили награду за головы израильских инженеров
AI breaks the old security playbook
AI has moved into enterprise operations faster than many security programs expected. It is embedded in workflows, physical systems, and core infrastructure. Some AI tools reach hundreds of millions of users each week. Inference costs have fallen 280 fold, but overall spending is still rising because usage keeps growing. Attackers are using the same tools. CISOs manage a broader attack surface driven by automation, new data paths, and machine led decisions. Deloitte’s Tech Trends 2026 … More →
The post AI breaks the old security playbook appeared first on Help Net Security.
Emotet木马分析与检测
Silent Pivot: Exploiting SpeechRuntimeMove for Stealthy Lateral Movement via DCOM
SpeechRuntimeMove Lateral Movement via SpeechRuntime DCOM trigger & COM Hijacking. This Proof of Concept (PoC) for Lateral Movement
The post Silent Pivot: Exploiting SpeechRuntimeMove for Stealthy Lateral Movement via DCOM appeared first on Penetration Testing Tools.
史上最疯:独家揭秘感染全球180万Android设备的巨型僵尸网络Kimwolf
Cheap Bots for Sale: Cambridge Study Reveals SMS Verification Bypassed for Just 8 Cents
One of the key defensive barriers against the creation of fake online accounts has proven alarmingly fragile—capable of
The post Cheap Bots for Sale: Cambridge Study Reveals SMS Verification Bypassed for Just 8 Cents appeared first on Penetration Testing Tools.
Perimeter Under Siege: 60 Million Attacks Target Industrial Edge Routers in 90-Day Surge
Over a three-month observation period, Forescout researchers recorded more than 60 million malicious requests targeting devices positioned at
The post Perimeter Under Siege: 60 Million Attacks Target Industrial Edge Routers in 90-Day Surge appeared first on Penetration Testing Tools.