Aggregator
Mis-issued TLS Certificates for 1.1.1.1 DNS Service Enable Attackers to Decrypt Traffic
The discovery of three improperly issued TLS certificates for 1.1.1.1, the popular public DNS service from Cloudflare, and the Asia Pacific Network Information Centre (APNIC). The certificates, which were issued in May 2025, could allow attackers to intercept and decrypt encrypted DNS lookups, potentially exposing users’ browsing habits. The existence of the unauthorized certificates was […]
The post Mis-issued TLS Certificates for 1.1.1.1 DNS Service Enable Attackers to Decrypt Traffic appeared first on Cyber Security News.
1,100 Ollama AI Servers Exposed to Internet With 20% of Them are Vulnerable
A comprehensive security investigation has uncovered a disturbing reality in the artificial intelligence infrastructure landscape: more than 1,100 instances of Ollama, a popular framework for running large language models locally, have been discovered exposed directly to the internet. This widespread exposure represents a significant security breach that affects organizations across multiple countries and continents. The […]
The post 1,100 Ollama AI Servers Exposed to Internet With 20% of Them are Vulnerable appeared first on Cyber Security News.
New Dire Wolf Ransomware Attack Windows Systems, Deletes Event Logs and Backup-Related Data
A sophisticated new ransomware strain known as Dire Wolf has emerged as a significant threat to organizations worldwide, combining advanced encryption techniques with destructive anti-recovery capabilities. The malware group first appeared in May 2025 and has since targeted 16 organizations across diverse industries including manufacturing, IT, construction, and finance in regions spanning Asia, Australia, Italy, […]
The post New Dire Wolf Ransomware Attack Windows Systems, Deletes Event Logs and Backup-Related Data appeared first on Cyber Security News.
Looking to settle argument and advice
Looking to settle argument and advice
0,2 наногаусса, которые изменили всё: обнаружен след самых первых магнитов космоса
Ваша репутация теперь в руках алгоритма. Алгоритмы Google вытесняют журналистику ради прибыли и сеют хаос.
Attackers are turning Salesforce trust into their biggest weapon
Salesforce has become a major target for attackers in 2025, according to new WithSecure research into threats affecting customer relationship management (CRM) platforms. The report shows that malicious activity inside Salesforce environments rose sharply in the first quarter of this year, with a twenty-fold increase in detections compared to late 2024. Tactics in focus (Source: WithSecure) Documents and QR codes as entry points The data shows that attackers are turning ordinary files into delivery mechanisms. … More →
The post Attackers are turning Salesforce trust into their biggest weapon appeared first on Help Net Security.
RustHound: cross-platform BloodHound collector tool, written in Rust
RustHound RustHound is a cross-platform BloodHound collector tool, written in Rust. (Linux, Windows, MacOS) No anti-virus detection and cross-compiled. RustHound
The post RustHound: cross-platform BloodHound collector tool, written in Rust appeared first on Penetration Testing Tools.
Apache DolphinScheduler Default Permissions Vulnerability Fixed – Update Now
A critical security vulnerability affecting Apache DolphinScheduler’s default permission system has been identified and patched, prompting urgent update recommendations from the Apache Software Foundation. The vulnerability, which stems from overly permissive default configurations in the popular workflow scheduling platform, allows unauthorized users to execute arbitrary workflows and access sensitive system resources without proper authentication controls. […]
The post Apache DolphinScheduler Default Permissions Vulnerability Fixed – Update Now appeared first on Cyber Security News.
「一句话生成爆款视频」,这款 AI 流量神器有点东西|AI 上新
法院裁定谷歌在用户退出活动跟踪后仍然收集用户数据 需向1亿用户赔偿4.25亿美元
Google Won’t Be Forced to Sell Chrome, But Must Share Search Data With Rivals
The U.S. District Court for the District of Columbia has ordered Google to share critical search data with competitors while allowing the tech giant to retain ownership of its Chrome browser. The decision, announced Tuesday by the Department of Justice’s Antitrust Division, represents a significant victory in the government’s ongoing battle against Google’s search monopoly […]
The post Google Won’t Be Forced to Sell Chrome, But Must Share Search Data With Rivals appeared first on Cyber Security News.
New ‘NotDoor’ Malware Attacks Outlook Users to Exfiltrate Data and Compromise Computers
A sophisticated backdoor linked to the notorious Russian cyber-espionage group APT28 allows attackers to exfiltrate data, upload files, and execute commands on compromised computers. The new, sophisticated backdoor targets Microsoft Outlook, which allows threat actors to steal data and take control of a victim’s machine. The malware, dubbed “NotDoor,” has been attributed to the Russian […]
The post New ‘NotDoor’ Malware Attacks Outlook Users to Exfiltrate Data and Compromise Computers appeared first on Cyber Security News.
vivo牵头制定的端侧大模型安全标准正式发布,自研技术积淀铸就行业安全共识
Академическая свобода мертва — государственные хакеры захватили научные платформы
DDoS attacks serve as instruments of political influence and disruption
In the first half of 2025, there were 8,062,971 DDoS attacks worldwide, with EMEA taking the brunt at 3.2 million attacks, according to Netscout. Peak attacks reached speeds of 3.12 Tbps and 1.5 Gpps. These attacks have moved beyond simple disruption tools and are now precision instruments of geopolitical influence. They can target critical infrastructure at the most sensitive moments. Geopolitical events drive global DDoS trends Major political events triggered significant spikes in attacks. During … More →
The post DDoS attacks serve as instruments of political influence and disruption appeared first on Help Net Security.