Aggregator
火绒安全|对品牌冒用零容忍 曝光伪装安装包静默监控套路
诚邀渠道合作伙伴共启新征程
【火绒安全周报】国家网络安全通报中心发文/知名软件被入侵
火绒小问答——「企业版」文件分发
火绒安全|对品牌冒用零容忍 曝光伪装安装包静默监控套路
CISA flags Apache ActiveMQ flaw as actively exploited in attacks
New CGrabber and Direct-Sys Malware Spread Through GitHub ZIP Files
go-exploit: Go Exploit Framework
go-exploit: Go Exploit Framework go-exploit is an exploit development framework for Go. The framework helps exploit developers create
The post go-exploit: Go Exploit Framework appeared first on Penetration Testing Tools.
Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery
Liongard has announced the expansion of LiongardIQ with new capabilities spanning programmatic AI integration, conversational querying, enhanced network discovery, and deeper identity mapping, extending its system of authority for asset intelligence across the full IT stack. Without a trusted foundation of asset intelligence, automation runs on assumptions, AI agents query stale data, and security gaps go undetected. LiongardIQ is that foundation, continuously discovering and monitoring every asset, identity, and configuration across the IT stack. “The … More →
The post Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery appeared first on Help Net Security.
How Rate Limiting Algorithms Balance Fairness and System Stability
AI-Native Marketing Is Here. It’s Not the Next Destination.
Ada-Win32-
OpenAI将与芯片新贵Cerebras达成重磅协议
CVE-2025-61144 | libtiff up to 4.7.1 readSeparateStripsIntoBuffer stack-based overflow (Nessus ID 299826 / WID-SEC-2026-0482)
CVE-2025-61143 | libtiff up to 4.7.1 libtiff/tif_open.c null pointer dereference (Nessus ID 299824 / WID-SEC-2026-0482)
CVE-2026-3184 | util-linux Hostname Canonicalization access control (EUVD-2026-18817 / Nessus ID 300049)
CVE-2026-41080 | libexpat up to 2.7.5 XML Document entropy (ID 47 / EUVD-2026-23276)
The “RedSun” Zero-Day That Turns Microsoft Defender into a Malware Installer
A novel method to acquire total systemic hegemony over Windows has surfaced, and remarkably, it eschews complex kernel
The post The “RedSun” Zero-Day That Turns Microsoft Defender into a Malware Installer appeared first on Penetration Testing Tools.