Aggregator
【安全圈】CBI捣毁英国39万英镑技术支持诈骗案,诺伊达呼叫中心两名关键嫌犯被捕
引力波探测器发现已知质量最大的黑洞合并事件
New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers
Cybersecurity researchers have unveiled advanced techniques for tracking attackers who use Remote Desktop Protocol (RDP) to move laterally through compromised networks, turning the very technology hackers rely on into a digital fingerprint that reveals their every move. The breakthrough centers on analyzing RDP’s bitmap caching mechanism, which stores 64×64 pixel tiles of remote screen images […]
The post New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
China-Built SafeLine WAF Gains Global Popularity Among Startups & Homelabs
CVE-2015-1486 | Symantec Endpoint Protection Manager up to 12.1 Management Console improper authentication (EDB-37812 / Nessus ID 85256)
部分肠道微生物会吸收和排除出 PFAS 化合物
美网络司令部利用“统一平台”提供联合网络作战基础设施
50个大模型的网络攻击能力深度测评
CVE-2004-1714 | ISS BlackICE PC Protection/BlackICE Server 3.6ccb protect.ini privileges management (EDB-24362 / Nessus ID 14270)
Wing FTP严重漏洞已遭在野利用
APP_KEYs遭暴露,超600款Laravel应用易遭RCE攻击
Weaponized Games: Threat Actors Target Gen Z Gamers Through Popular Titles
Kaspersky security researchers have discovered sophisticated threat actor activities that take advantage of the digitally native Gen Z population, which was born between 1997 and 2012 and is heavily involved in gaming, streaming, and anime, for malevolent purposes. Over a one-year period from April 1, 2024, Kaspersky documented at least 19 million attempts to disseminate […]
The post Weaponized Games: Threat Actors Target Gen Z Gamers Through Popular Titles appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Rethinking Defense in the Age of AI-Generated Malware
Attackers are using public models and automation tools to generate malware that is unique to every campaign. It doesn't look like anything we've seen before.
The post Rethinking Defense in the Age of AI-Generated Malware appeared first on Security Boulevard.
Man Gets Suspended Sentence for Hate-Fueled UK Train Stations WiFi Hack
Ты говоришь: «Мне страшно жить», ИИ отвечает: «Прыгай с моста»
Interlock Ransomware Unleashes New RAT in Widespread Campaign
Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
Threat actors have exploited Microsoft Compiled HTML Help (CHM) files to distribute malware, with a notable sample named deklaracja.chm uploaded to VirusTotal from Poland. This CHM file, a binary container for compressed HTML and associated objects, serves as a delivery vehicle for a multi-stage infection chain. Upon execution via the default hh.exe handler, the file […]
The post Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.