Aggregator
从披露到攻击仅4小时:WordPress插件OttoKit高危漏洞遭快速利用;SK被曝遭入侵,被窃取1TB数据 | 牛览
PT NAD vs хакерский инструментарий
Патч не спас: критический баг в NVIDIA Container Toolkit пришлось исправлять дважды
2024 年 58% 的 PC 游戏收入来自微交易
Что делать, если потерял смартфон, а там вся жизнь? План экстренных действий
微软2025年4月补丁周二修复了利用零日漏洞的134个漏洞
Next.js 中的严重漏洞可让黑客绕过授权
JVN: Rockwell Automation製Arenaにおける複数の脆弱性
JVN: SUBNET Solutions製PowerSYSTEM Center 2020における複数の脆弱性
JVN: 複数のABB製Artic製品における複数の脆弱性
Why security culture is crypto’s strongest asset
In this Help Net Security interview, Norah Beers, CISO at Grayscale, discusses key security challenges in managing crypto assets, adversary tactics, private key management, and securing both hot and cold wallets. From a threat modeling perspective, what unique adversary tactics do you see in the crypto space that don’t often appear in traditional finance? The adversaries themselves aren’t fundamentally different between traditional finance and the crypto industry, but certain of the tactics they employ are … More →
The post Why security culture is crypto’s strongest asset appeared first on Help Net Security.
JVN: INFINITT Healthcare製INFINITT PACS System Managerにおける複数の脆弱性
CVE-2024-48887
CVE-2025-21293
Ransomware groups push negotiations to new levels of uncertainty
Ransomware attacks increased by nearly 20% in 2024, and the severity rose by 13%, according to At-Bay. The blast radius of ransomware continues to grow as businesses impacted by attacks on vendors and partners increased 43%, while the average cost of these third-party incidents jumped by 72%. “Remote access tools like VPNs and RDP continue to attract a high level of attention from cybercriminals. In 2024, they were correlated with 80% of ransomware attacks, up … More →
The post Ransomware groups push negotiations to new levels of uncertainty appeared first on Help Net Security.
OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
打开邮件就中招!Foxmail在野漏洞,速修
打开邮件就中招!Foxmail在野漏洞,速修
Why remote work is a security minefield (and what you can do about it)
Remote work is seen as more than a temporary solution, it’s a long-term strategy for many organizations. Remote work cybersecurity challenges Unsecured networks: Workers often operate from home or public Wi-Fi networks that don’t have the security features of corporate environments. Bring Your Own Device (BYOD): Personal devices are frequently used for work, but these devices may not have the same security protections as company-issued ones. They often lack up-to-date software, antivirus protection, and can … More →
The post Why remote work is a security minefield (and what you can do about it) appeared first on Help Net Security.