Aggregator
美国参议员要求调查DeepSeek数据安全风险;趋势科技Apex One曝严重命令注入漏洞;东方通董事长被立案调查 | 牛览
お知らせ:インシデント報告Webフォームメンテナンス(2025年8月7日)終了のお知らせ
WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns
WhatsApp has permanently removed 6.8 million accounts during the first half of 2024 as part of an aggressive crackdown on global scamming operations, parent company Meta announced this week. The massive account purge primarily targeted sophisticated fraud networks operating from organized criminal centers across Southeast Asia, where forced labor is frequently used to execute elaborate […]
The post WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SETI ARISE: Comprehensive Educational Program in Radio Astronomy
思科:身份服务引擎中存在严重的RCE漏洞
XCon2025议题||BinaryAI:大模型时代下的二进制安全智能化分析
XCon2025议题||BinaryAI:大模型时代下的二进制安全智能化分析
思科:身份服务引擎中存在严重的RCE漏洞
ИИ без интернета — как запустить мощную нейросеть прямо на своём ПК
Has Cyber Been Infected With the Economic Malaise?
No, Mr. Altman, Passwords Are Not Back in Vogue
OpenAI CEO Sam Altman recently claimed that artificial intelligence has "fully defeated most of the ways that people authenticate currently, other than passwords." A host of security experts disagree and point out that passwords got us into this authentication mess to begin with.
Five-Year-Old D-Link Bugs Under Active Exploitation
Hackers are actively exploiting years-old flaws in obsolete Wi-Fi cameras and video recorders made by D-Link, warn U.S. cybersecurity authorities. Possibly Chinese hackers have used one of the flaws to implant HiatusRAT malware. "Attackers don’t care if a vulnerability is new or old."
Dialysis Firm Attack Affects 1 Million, Costs $13.5M to Date
DaVita Inc., one of the largest kidney dialysis providers in the world, told regulators that an April cyberattack has cost the company $13.5 million so far and has affected more than one million people in the U.S., and counting. Interlock says it's behind the data theft and ransomware attack.
MCP Protocol Bug Let Attackers Execute Code in Cursor
Check Point researchers found a RCE flaw in Cursor, an AI-powered code editor, by manipulating a previously approved model context protocol configuration. Once a developer approved a configuration file for an MCP server, any future changes to that file could be executed without further prompts.
Candiru Spyware Infrastructure Uncovered
Security researchers uncovered a previously unseen malware cluster associated with Israeli spyware maker Candiru. The company may have rebranded itself to evade sanctions to continue its operations. It continues to operate despite its inclusion in 2021 onto an exports blacklist by the United States.
Git 实战:如何将 Detached HEAD 状态下的修改推送为最新的 main 分支(含完整命令)
Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes
Cybersecurity experts are raising alarms over a sophisticated social engineering attack that allowed threat actors to compromise corporate systems in under five minutes, according to a recent incident response investigation by NCC Group’s Digital Forensics and Incident Response (DFIR) team. The attack began with threat actors impersonating legitimate IT support personnel, targeting approximately twenty employees […]
The post Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
«Откройте штраф от госорганов» — PDF-приманка запускает цепочку из 5 этапов взлома
Beyond PQC: Building adaptive security programs for the unknown
In this Help Net Security interview, Jordan Avnaim, CISO at Entrust, discusses how to communicate the quantum computing threat to executive teams using a risk-based approach. He explains why post-quantum cryptography (PQC) is an urgent and long-term priority. Avnaim also outlines practical steps CISOs can take to build crypto agility and maintain digital trust. From your perspective as a CISO, how do you frame the quantum computing threat to executives and the board? Complexity can … More →
The post Beyond PQC: Building adaptive security programs for the unknown appeared first on Help Net Security.