Red Hat Security Advisory 2024-9991-03 不安全 2 days 5 hours ago The following advisory data is extracted from:https://security.access.redhat.com/data/csaf/v2/advi
Google's New Restore Credentials Tool Simplifies App Login After Android Migration 不安全 2 days 5 hours ago Mobile Security / PrivacyGoogle has introduced a new feature called Restore Credentials to help us
Walking the Walk: How Tenable Embraces Its "Secure by Design" Pledge to CISA 不安全 2 days 5 hours ago As a cybersecurity leader, Tenable was proud to be one of the original signatories of CISA’s “Secure
How Prices are Set on the Dark Web: Exploring the Economics of Cybercrime 不安全 2 days 5 hours ago November 25, 2024 3 Minute Read
PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot 不安全 2 days 5 hours ago Software Supply Chain / MalwareThe administrators of the Python Package Index (PyPI) repository ha
Malware campaign abused flawed Avast Anti-Rootkit driver 不安全 2 days 5 hours ago Malware campaign abused flawed Avast Anti-Rootkit driver Pierlu
“Hilariously insecure”: Andrew Tate’s The Real World breached, 800,000 users affected 不安全 2 days 5 hours ago Andrew Tate’s online education platform The Real World—formerly known a
In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity 不安全 2 days 6 hours ago Every enterprise should see itself as a cybersecurity company. It doesn’t matter what industry t
The strange case of disappearing Russian servers, (Mon, Nov 25th) 不安全 2 days 6 hours ago Few months ago, I noticed that something strange was happening with the number of servers seen by S
Better Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed 不安全 2 days 6 hours ago Organizations striving to stay ahead in the digital landscape often crown speed and agility as t
Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together 不安全 2 days 6 hours ago Organizations routinely encounter a myriad of cyberthreats that jeopardize their data, operation
The Cyberthreats from China are Ongoing: U.S. Officials 不安全 2 days 7 hours ago Chinese-backed hackers continue to burrow into the IT networks of critical infrastructure in an
Dozens of Machines Infected: Year-Long NPM Supply Chain Attack Combines Crypto Mining and Data Theft 不安全 2 days 7 hours ago Through o
Flying Under the Radar - Security Evasion Techniques 不安全 2 days 8 hours ago Dive into the evolution of phishing and malware evasion techniques and understand how attackers ar
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 18 - Nov 24) 不安全 2 days 8 hours ago Cybersecurity / Critical UpdatesWe hear terms like "state-sponsored attacks" and "critical vulnera
国际 | 印度惊现“数字逮捕”电诈骗局 不安全 2 days 8 hours ago 扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063今年以来,印度接连发生多起被称为“数字逮捕”的电诈骗局,犯罪分子不仅冒充警察和电信监管机构官员,还伪造“审判现场”,受害
专家观点 | 法律监管+技术人工审核:提升AI内容输出可控性 不安全 2 days 8 hours ago 扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063文 | 中国传媒大学媒体融合与传播国家重点实验室、计算机与网络空间安全学院教授 范永开AI聊天角色在回答中可能出现色情擦
前沿 | 推动构建网络空间命运共同体迈向新阶段 不安全 2 days 8 hours ago 扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063文 | 中国社会科学院世界经济与政治研究所国家安全研究室主任、研究员 郎平11月19日至22日,2024年世界互联网大会
关注 | 建设100个以上可信数据空间,这份文件以可信安全促要素流通 不安全 2 days 8 hours ago 扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063国家数据局23日发布消息,根据最新印发的《可信数据空间发展行动计划(2024—2028年)》,到2028年,我国将建成1