Aggregator
Phrack 杂志第 72 期:PHP 的艺术 —— 我的 CTF 之旅与未被讲述的故事
Phrack 杂志第 72 期:守护 PHP 神庙
Phrack 杂志第 72 期:APT 下载——朝鲜文件
Former developer jailed after deploying kill-switch malware at Ohio firm
Former developer jailed after deploying kill-switch malware at Ohio firm
Interpol operation seizes $97 million in African cybercrime sweep
Authorities in Africa have arrested 1,209 people in an Interpol-led crackdown on cybercrime that targeted nearly 88,000 victims. 11,432 malicious infrastructures were dismantled during Operation Serengeti 2025 (Source: Interpol) Operation Serengeti 2.0 The operation, which ran from June to August 2025, recovered $97.4 million and shut down 11,432 malicious online systems. Called Operation Serengeti 2.0, the effort brought together investigators from 18 African nations and the United Kingdom. It focused on serious cybercrimes such as … More →
The post Interpol operation seizes $97 million in African cybercrime sweep appeared first on Help Net Security.
A New “Browser War” Is Coming: How AI Agents Are Reshaping Cybersecurity
Palo Alto Networks CEO Nikesh Arora has sounded the alarm over the dawn of a new wave of “browser wars.” Speaking during the company’s Q4 2025 earnings call, he observed that Microsoft, Google, OpenAI,...
The post A New “Browser War” Is Coming: How AI Agents Are Reshaping Cybersecurity appeared first on Penetration Testing Tools.
ERMAC安卓恶意软件源代码泄露,银行木马基础设施遭曝光
【已复现】Docker Desktop Engine API 未授权访问漏洞安全通告(CVE-2025-9074)
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor
Linux environments, long considered bastions of security, are facing a sophisticated new threat that challenges traditional assumptions about operating system safety. A recently discovered malware campaign exploits an ingenious attack vector that weaponizes RAR archive filenames to deliver the VShell backdoor, demonstrating how attackers are evolving beyond conventional exploitation techniques to target scripting patterns and […]
The post New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor appeared first on Cyber Security News.
中秋第三趴 | 公益全体活动上线!
Microsoft to Make All Products Quantum Safe by 2033
网络攻击中的变相怪杰:DupeDog软件框架分析
网络攻击中的变相怪杰:DupeDog软件框架分析
Секунды на атаку, месяцы на восстановление. Active Directory беззащитна — когда настройки остаются дефолтными
Anatsa Malware Attacking Android Devices to Steal Login Credentials and Monitor Keystrokes
The Anatsa banking trojan, also known as TeaBot, continues to evolve as one of the most sophisticated Android malware threats targeting financial institutions worldwide. First discovered in 2020, this malicious software has demonstrated remarkable persistence in infiltrating Android devices through the official Google Play Store, where it masquerades as legitimate document reading applications to steal […]
The post Anatsa Malware Attacking Android Devices to Steal Login Credentials and Monitor Keystrokes appeared first on Cyber Security News.
Top 10 Frequently Asked Questions on ISO 27018 Compliance
As cloud adoption continues to rise, organizations are increasingly concerned about safeguarding personal data stored and processed by cloud service providers (CSPs). ISO/IEC 27018 is an internationally recognized standard that specifically addresses data protection in cloud environments. It provides guidelines to help CSPs implement effective measures for protecting Personally Identifiable Information (PII). In this blog, […]
The post Top 10 Frequently Asked Questions on ISO 27018 Compliance appeared first on Kratikal Blogs.
The post Top 10 Frequently Asked Questions on ISO 27018 Compliance appeared first on Security Boulevard.