Aggregator
CVE-2026-2210 | D-Link DIR-823X 250416 /goform/set_filtering sub_4211C8 os command injection (WID-SEC-2026-0340 / CNNVD-202602-1393)
CLOP
You must login to view this content
CLOP
You must login to view this content
CLOP
You must login to view this content
New Cybercrime Group 0APT Accused of Faking Hundreds of Breach Claims
Microsoft 365 outage takes down admin center in North America
红队实战复盘:从无效 SQL 注入到 PostgreSQL 全域攻陷的深度突破
Singapore telcos breached in China-linked cyber espionage campaign
Singapore’s four major telecommunications companies were hit by a coordinated cyber espionage campaign last year, the country’s Cyber Security Agency (CSA) has revealed. An advanced persistent threat group known as UNC3886 has probed deep into the networks of M1, SIMBA Telecom, Singtel, and StarHub, spurring Singapore’s security agencies to mount a large cyber defence operation. “Under Operation Cyber Guardian, the authorities worked closely with the telcos to limit UNC3886’s movement into the networks and ensure … More →
The post Singapore telcos breached in China-linked cyber espionage campaign appeared first on Help Net Security.
记一次EDU证书站挖掘
纹章学结合开源情报:解析俄罗斯情报机构信息作战能力
Microsoft tightens Windows security with app transparency and user consent
Microsoft is strengthening default protections in Windows through two security initiatives, Windows Baseline Security Mode and User Transparency and Consent. User Transparency and Consent User Transparency and Consent introduces a structured approach to how Windows presents security decisions to users. The operating system will prompt users when applications request access to sensitive resources such as files, cameras, or microphones, and when installers attempt to add additional software. Permission decisions are recorded so they can be … More →
The post Microsoft tightens Windows security with app transparency and user consent appeared first on Help Net Security.
Hackers Weaponizing 7-Zip Downloads to Turn Your Home Computers into Proxy Nodes
A deceptive campaign targeting unsuspecting users has emerged, using a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy nodes. The malicious operation relies on a lookalike domain, 7zip[.]com, which closely mimics the legitimate 7-zip.org website, tricking users into downloading a compromised installer that appears fully […]
The post Hackers Weaponizing 7-Zip Downloads to Turn Your Home Computers into Proxy Nodes appeared first on Cyber Security News.
SAP Security Patch Day – Critical SAP CRM and SAP S/4HANA Code Injection Vulnerabilities Fixed
SAP’s February 2026 Security Patch Day delivered fixes that SAP urges customers to prioritize to reduce exposure across core enterprise workloads. The release includes 26 new SAP Security Notes and one update to a previously published note. SAP’s monthly bulletin is a remediation guide for vulnerabilities identified in SAP products, with an explicit recommendation to […]
The post SAP Security Patch Day – Critical SAP CRM and SAP S/4HANA Code Injection Vulnerabilities Fixed appeared first on Cyber Security News.
ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy Malicious Payload
The cybersecurity sector has been impacted by the sudden appearance of “React2Shell” (CVE-2025-55182), a critical vulnerability affecting Next.js and React Server Components. Following its public disclosure on December 4, 2025, threat actors mobilized with alarming speed, launching exploitation attempts against internet-facing systems within just 20 hours. The flaw allows unauthenticated attackers to execute arbitrary code […]
The post ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy Malicious Payload appeared first on Cyber Security News.