Aggregator
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
帝企鹅因气候变化导致数量减少被列为濒危
Cybersecurity Risks of Hiring a Virtual Assistant and How to Protect Your Business
McGraw Hill Confirms Data Breach Exposing 13.5 Million Users’ Personal Data
Education publishing giant McGraw-Hill has confirmed a data breach following an extortion attempt, with more than 100GB of stolen data now publicly distributed online, exposing the personal information of approximately 13.5 million users. The breach, disclosed in April 2026, stems from a misconfiguration in McGraw-Hill’s Salesforce environment. According to the company, the incident exposed “a […]
The post McGraw Hill Confirms Data Breach Exposing 13.5 Million Users’ Personal Data appeared first on Cyber Security News.
Payload
You must login to view this content
Payload
You must login to view this content
Payload
You must login to view this content
Payload
You must login to view this content
Payload
You must login to view this content
抹香鲸的发声沟通方式与人类相似
Нейросети находят дыры в коде быстрее, чем люди успевают их записывать. В NIST подняли белый флаг
BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory
ANY.RUN has observed a sustained surge in a credential-phishing campaign active since 2024. This campaign, dubbed BlobPhish, introduces a sneaky twist: instead of delivering phishing pages via traditional HTTP requests, it generates them directly inside the victim’s browser using blob objects. The result is a phishing payload that lives entirely in memory, leaving little to no trace in logs, caches, […]
The post BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory appeared first on ANY.RUN's Cybersecurity Blog.
Fake Proton VPN Sites and Gaming Mods Spread NWHStealer in New Windows Malware Campaign
A newly identified information-stealing malware called NWHStealer is quietly making its way onto Windows systems through a well-disguised campaign that uses fake VPN websites, gaming mods, and hardware utility tools as bait. The attackers are not relying on spam emails or obvious phishing tricks. Instead, they are placing malware inside files that people actively search […]
The post Fake Proton VPN Sites and Gaming Mods Spread NWHStealer in New Windows Malware Campaign appeared first on Cyber Security News.