Aggregator
Hackers Leveraging x86-64 Binaries on Apple Silicon to Deploy macOS Malware
Advanced threat actors increasingly leverage x86-64 binaries and Apple’s Rosetta 2 translation technology to bypass execution policies and deploy malware on Apple Silicon devices. The technique exploits architectural differences between Intel and ARM64 processors while leaving behind forensic artifacts that investigators can use to reconstruct attacks. Attackers Leveraging x86-64 Binaries on Apple Silicon Apple’s Rosetta […]
The post Hackers Leveraging x86-64 Binaries on Apple Silicon to Deploy macOS Malware appeared first on Cyber Security News.
Data breach at Japanese telecom giant NTT hits 18,000 companies
Linux Distro Tails 6.13 Released with Improved Wi-Fi Hardware Detection
The Tails Project announced the release of Tails 6.13 on March 6, 2025, marking a significant update to its privacy-centric Linux distribution. This iteration introduces improved diagnostics for Wi-Fi hardware compatibility, updates to the Tor Browser and client, and critical fixes for Persistent Storage creation and software installation workflows. Targeted at users prioritizing anonymity, Tails […]
The post Linux Distro Tails 6.13 Released with Improved Wi-Fi Hardware Detection appeared first on Cyber Security News.
每周勒索威胁摘要
每周勒索威胁摘要
每周勒索威胁摘要
每周勒索威胁摘要
每周勒索威胁摘要
每周勒索威胁摘要
每周勒索威胁摘要
通过sql注入来绕过登录验证
Beware of Fake Tax Claims that Tricks Users to Steal Over $10,000 From Victims
Tax season has become a high-stakes battleground for cybercriminals, who leverage advanced technologies like deepfake audio and AI-generated phishing campaigns to steal over $10,000 from unsuspecting victims. According to a 2025 McAfee survey, 10% of tax scam losses exceeded $10,000, with Gen Z adults (18–24) reporting the highest exposure to fraudulent attempts. Meanwhile, the IRS’s […]
The post Beware of Fake Tax Claims that Tricks Users to Steal Over $10,000 From Victims appeared first on Cyber Security News.
Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks
A recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute arbitrary code, and bypass critical security controls. These findings, disclosed by researchers at DEFCON 32 HHV and Ekoparty 2024, highlight systemic risks in widely used small office/home office (SOHO) routers due to outdated firmware, weak […]
The post Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.