Aggregator
New Phishing Attack Weaponizing Event Invitations to Steal Login Credentials
A large-scale phishing campaign has been quietly targeting organizations across the United States, using fake event invitations as bait. Rather than sending a suspicious attachment or an obvious scam link, attackers lure victims with what appears to be a legitimate party or gathering invitation. Once clicked, those links lead to pages designed to steal login […]
The post New Phishing Attack Weaponizing Event Invitations to Steal Login Credentials appeared first on Cyber Security News.
欧盟《网络安全法2》提案与对中国ICT供应商影响的分析
New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control
A newly identified malware called Salat is raising serious alarms across the cybersecurity community for its sophisticated design and surprisingly wide range of capabilities. Built using the Go programming language, it operates as a full remote access trojan, giving attackers deep and persistent access to any system it infects. Unlike simpler tools that focus on […]
The post New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control appeared first on Cyber Security News.
JVN: CISA ICS Advisory / ICS Medical Advisory(2026年05月05日)
传月之暗面新融 20 亿美元,估值超 200 亿美元;豆包曝光首个全模态理解模型;开播 24 年后, 星空卫视停播|极客早知道
North Korean hackers targeted ethnic Koreans in China with Android ‘BirdCall’ malware
New FEMITBOT Network Uses Telegram Mini Apps to Push Crypto Fraud and Android Malware
A new and highly organized fraud network called FEMITBOT has emerged, exploiting Telegram’s Mini App feature to run large-scale cryptocurrency scams and push malicious Android software onto users worldwide. The campaign, which came to light in April 2026, operates through fake apps designed to look like real cryptocurrency exchanges, streaming services, financial platforms, and AI […]
The post New FEMITBOT Network Uses Telegram Mini Apps to Push Crypto Fraud and Android Malware appeared first on Cyber Security News.
安全龙虾WinClaw算力升级!再开放8000名用户Token永久免费
用Agent评测思路管理AI Coding —— 31万行代码AI重构的实践
Can an LLM Formally Verify Your Code?
[webapps] ThingsBoard IoT Platform 4.2.0 - Server-Side Request Forgery (SSRF)
[local] NocoBase 2.0.27 - VM Sandbox Escape
[webapps] Bludit CMS 3.18.4 - RCE
[webapps] LuaJIT 2.1.1774638290 - Arbitrary Code Execution
[webapps] Ghost CMS 6.19.0 - SQLi
[remote] telnetd 2.7 - Buffer Overflow
Darkhub Hacking-for-Hire Portal Advertises Crypto Fraud, Message Interception, and Monitoring
A dark web platform calling itself Darkhub has surfaced on the Tor network, openly advertising hacking-for-hire services to anyone willing to pay. The platform presents itself as a one-stop shop for illegal cyber activity, with offerings ranging from breaking into social media accounts to intercepting private messages and manipulating financial records. What makes Darkhub notable […]
The post Darkhub Hacking-for-Hire Portal Advertises Crypto Fraud, Message Interception, and Monitoring appeared first on Cyber Security News.
MoreIdeas General Trading Allegedly Re-Leaked Exposing 787,217 Student Records From the Dubai EdTech Firm
M3RX
You must login to view this content