Aggregator
【技巧】如何获取CIA投资的科技公司名单
CVE-2014-9241 | MyBB up to 1.8.0 report.php file cross site scripting (ID 129109 / EDB-35224)
CVE-2001-0704 | Arcadia Internet Store 1.0 tradecli.dll template Path information disclosure (EDB-20948 / XFDB-6738)
特斯拉汽车欧洲 1 月销量暴跌 45%
ИИ съел домашку: образовательные платформы на грани выживания из-за технологий Google
Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models
Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s o1/o3, DeepSeek-R1, and Google’s Gemini 2.0 Flash models through a novel attack method called Hijacking Chain-of-Thought (H-CoT). The research reveals how advanced safety mechanisms designed to prevent harmful outputs can be systematically bypassed using the models’ reasoning processes, raising urgent questions […]
The post Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s
INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small business leader in online course providers and cybersecurity professional development, along with its designation as the recipient of G2’s 2025 Best Software Awards for Education Products. This category of awards ranks the world’s top 50 […]
The post INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DeepSeek本地化部署有风险!快来看看你中招了吗?
DeepSeek本地化部署有风险!快来看看你中招了吗?
DeepSeek本地化部署有风险!快来看看你中招了吗?
Qualcomm & Google Tied Up to Offer Eight Years of Software and Security Updates
In a transformative move for smartphone longevity, Qualcomm Technologies, Inc., and Google have announced a collaboration to enable eight years of Android software and security updates for devices powered by Snapdragon mobile platforms. This initiative, targeting smartphones launching with the Snapdragon 8 Elite Mobile Platform and future Snapdragon 8/7-series chipsets, marks the industry’s longest software […]
The post Qualcomm & Google Tied Up to Offer Eight Years of Software and Security Updates appeared first on Cyber Security News.
Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass
A newly disclosed vulnerability in the GRUB2 bootloader’s read command (CVE-2025-0690) has raised concerns about potential Secure Boot bypasses and heap memory corruption in Linux systems. Red Hat Product Security rates this integer overflow flaw as moderately severe. It could enable attackers with physical access and elevated privileges to execute arbitrary code or undermine Secure […]
The post Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass appeared first on Cyber Security News.
Сотрудник Apple рассказал, как компания планировала отслеживать платежи пользователей
INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings
INE, the leading provider of networking and cybersecurity training and certifications, today announced its recognition as an enterprise and small business leader in online course providers and cybersecurity professional development, along with its designation as the recipient of G2’s 2025 Best Software Awards for Education Products. This category of awards ranks the world’s top 50 […]
The post INE Secures Spot in G2’s 2025 Top 50 Education Software Rankings appeared first on Cyber Security News.
Lockbit
Lockbit
Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site
Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website. This malware-as-a-service (MaaS) operation employs advanced social engineering tactics combined with anti-analysis techniques to compromise sensitive user data, marking a significant escalation in macOS-targeted threats. The attack chain begins with malvertising campaigns redirecting users to deepseek.exploreio[.]net, […]
The post Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site appeared first on Cyber Security News.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-49035 Microsoft Partner Center Improper Access Control Vulnerability
- CVE-2023-34192 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability
Users and administrators are also encouraged to review the Palo Alto Threat Brief: Operation Lunar Peek related to CVE-2024-0012, the Palo Alto Security Bulletin for CVE-2024-0012, and the Palo Alto Security Bulletin for CVE-2024-9474 for additional information.
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on February 25, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-056-01 Rockwell Automation PowerFlex 755
- ICSMA-25-030-01 Contec Health CMS8000 Patient Monitor (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.