password
icon
URL
type
date
summary
status
slug
tags
category
免责声明:本文章中的信息和观点仅代表引用网站或者原作者,本网站只是引用其观点、内容,不代表本网站、公众号、黑客驰本人的观点或立场。
本文章论述内容仅作为教育参考使用,如有违法行为与本网站和黑客驰无关,国法无情,自行负责。
将我们的公众号内容加星获得隐藏内容。
↘️以下为目录,点击可跳转,右划点击标题跳转到原文
网安新闻
标题
Tags
发布时间
摘要
来源
Apr 28, 2025
新闻速览 工信部CSTIS提醒防范WinRAR安全绕过漏洞的风险 第一季度159个CVE遭到野外利用近
安全牛
Apr 29, 2025
新闻速览 2025年提升全民数字素养与技能工作要点印发提出营造安全有序数字环境 全球能源巨头成为目标
安全牛
Apr 30, 2025
新闻速览 工业和信息化部加快自动驾驶系统安全要求强制性国家标准研制 网络安全标准实践指南个人信息保
安全牛
零日漏洞
Apr 30, 2025
基于多模态学习的混淆隧道流量行为检测方案 by ourren 2024年在野零日漏洞利用分析上 by ourren 软件工厂关键技术分析及启示 by ourren 更多最新文章请访问 SecWiki
SecWiki News
邮件安全
病毒
Apr 28, 2025
企业邮箱如同数字城堡而邮件安全网关则是城墙上的智能哨兵它需精准拦截恶意钓鱼邮件病毒附件等外敌还要
安全牛
数据泄露
DoS攻击
DDoS攻击
Cisco
Verizon
Apr 29, 2025
IoT安全透视DLink DWR932B固件全面逆向分析 by ourren 2024年网络安全产业态势回顾及2025年趋势展望 by ourren 2024年暗网态势研究报告数据泄露趋势与治理挑战 by ourren 基于静态分析的路由器固件二进制漏洞挖掘经验分享 by ourren Verizon2025数据泄漏调查报告网络攻击越来越快准隐狠 by ourren DDoS攻击威胁报告2025版 by ourren Foundationsec Cisco Foundation AIs OpenSource Model by ourren 更多最新文章请访问 SecWiki
SecWiki News
威胁情报
标题
Tags
发布时间
摘要
来源
Apr 28, 2025
A list of topics we covered in the week of April 21 to April 27 of 2025
Malwarebytes Labs
Apr 28, 2025
WorkComposer, an employee monitoring app, has leaked millions of screenshots through an unprotected AWS S3 bucket.
Malwarebytes Labs
Apr 29, 2025
AI search service Perplexity AI doesnt just want you using its appit wants to take over your web browsing experience too.
Malwarebytes Labs
Apr 30, 2025
Fake emails pretending to come from the US Social Security Administration try to get targets to install ScreenConnect for remote access.
Malwarebytes Labs
May 1, 2025
These 3 cybersecurity threats may not be the most sophisticated, but theyre the most effectiveand seriousthreats for small businesses.
Malwarebytes Labs
Apr 29, 2025
Advertised on Telegram, Gremlin Stealer is new malware active since March 2025 written in C. Data stolen is uploaded to a server for publication. The post Gremlin Stealer New Stealer on Sale in Underground Forum appeared first on Unit 42 .
Unit 42 by Palo Alto Networks
May 1, 2025
Programs leveraging AI agents are increasingly popular. Nine attack scenarios using opensource agent frameworks show how bad actors target these applications. The post AI Agents Are Here. So Are the Threats. appeared first on Unit 42 .
Unit 42 by Palo Alto Networks
SAP
Apr 28, 2025
CVE202531324 is a maximum severity bug that attackers exploited weeks before SAP released a patch for it.
Dark Reading
NVIDIA
Apr 29, 2025
NVIDIAs DOCA Argus prevents attacks before they compromise AI architectures.
Dark Reading
CISA
Apr 30, 2025
Secretary Noem asks the cybersecurity community to get in touch with CISA to help reshape the agency to focus on finding efficiencies.
Dark Reading
CISA
Apr 30, 2025
Jen Easterly, former director of CISA, discussed the first 100 days of the second Trump administration and criticized the presidents mandate for loyalty during a panel at RSAC 2025.
Dark Reading
China
May 1, 2025
The Chinalinked cyberoperations group, better known as Lotus Panda, uses its own custom malware to focus on government agencies and private companies in Hong Kong, the Philippines, Taiwan, and Vietnam.
Dark Reading
Cisco
May 1, 2025
Cisco joins the agentic AI wave with the introduction of advanced LLMs to autonomously verify and investigate attacks.
Dark Reading
Russia
May 1, 2025
Russias cyberattacks on Ukraine have increased dramatically, targeting the countrys government and defense infrastructure.
Dark Reading
Microsoft
May 1, 2025
Microsoft has set May 5 as the deadline for bulk email compliance. In this Tech Tip, we show how organizations can still make the deadline.
Dark Reading
Disney
Apr 29, 2025
A former Disney employee has been sentenced to three years in prison for computer fraud and identity theft.
Malwarebytes Labs
Google
May 1, 2025
Cybercriminals are having less success targeting enduser technology with zeroday attacks, said Googles security team this week.
Malwarebytes Labs
Apple
May 1, 2025
Researchers found a set of vulnerabilities that puts all devices leveraging Apples AirPlay at risk.
Malwarebytes Labs
Trojan
China
Apr 29, 2025
A spearphishing campaign sent Trojanized versions of legitimate wordprocessing software to members of the World Uyghur Congress as part of Chinas continued cyberespionage activity against the ethnic minority.
Dark Reading
Windows
Microsoft
May 1, 2025
Microsofts David Weston describes the new feature as the most significant architectural Windows security change in a generation.
Dark Reading
May 1, 2025
A LevelBlue report looks at what goes into the security postures of a cyberresilient organization, and found that AI is still a blind spot.
Dark Reading
Apr 30, 2025
The chat infrastructure and dataleak site of the notorious ransomwareasaservice group has been inactive since March 31, according to security vendors.
Dark Reading
May 1, 2025
How one unreasonable client got lucky during a cyber incident, despite their unreasonable response to the threat.
Dark Reading
Apr 30, 2025
Leaders at federal research organizations DARPA, ARPAI, and ARPAH discussed the myriad obstacles in addressing critical infrastructure security at RSAC Conference 2025.
Dark Reading
Apr 30, 2025
Opportunistic threat actors targeted Portuguese and Spanish speakers by spoofing Portugals national airline in a campaign offering compensation for delayed or disrupted flights.
Dark Reading
Apr 30, 2025
A SLAACspoofing, adversaryinthemiddle campaign is hiding the WizardNet backdoor malware inside updates for legitimate software and popular applications.
Dark Reading
Apr 30, 2025
While nationstate actors are demonstrating how easily they can infiltrate US networks, government officials dont seem to have a clear vision for what comes next.
Dark Reading
CISA
Apr 29, 2025
Secretary Noem asks the cybersecurity community to get in touch with CISA to help reshape the agency to focus on finding efficiencies.
Dark Reading
漏洞分析
标题
Tags
发布时间
摘要
来源
May 1, 2025
A friend asked me if my pngdump.py tool can extract individual bits from an image cfr. diary entry Steganography Analysis With pngdump.py.
SANS Internet Storm Center
Kaspersky
Apr 29, 2025
The Kaspersky Global Emergency Response Team GERT detected an Outlaw mining botnet in a customer incident. In this article, we share insights into this botnets SSHbased infection chain.
Kaspersky Securelist
Trend Micro
Apr 28, 2025
Government and telecommunications sectors in Southeast Asia have become the target of a sophisticated campaign undertaken by a new advanced persistent threat APT group called Earth Kurma since June 2024. The attacks, per Trend Micro, have leveraged custom malware, rootkits, and cloud storage service
Hacker News Exploits
Windows
Apr 29, 2025
In a new campaign detected in March 2025, senior members of the World Uyghur Congress WUC living in exile have been targeted by a Windowsbased malware thats capable of conducting surveillance. The spearphishing campaign involved the use of a trojanized version of a legitimate opensource word process
Hacker News Exploits
Google
Apr 29, 2025
Google has revealed that it observed 75 zeroday vulnerabilities exploited in the wild in 2024, down from 98 in 2023 but an increase from 63 the year before. Of the 75 zerodays, 44 of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances. Zeroday e
Hacker News Exploits
Microsoft
Apr 29, 2025
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats all while keeping productivity high. Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can gene
Hacker News Exploits
India
Apr 30, 2025
A high court in the Indian state of Karnataka has ordered the blocking of endtoend encrypted email provider Proton Mail across the country. The High Court of Karnataka, on April 29, said the ruling was in response to a legal complaint filed by M Moser Design Associated India Pvt Ltd in January 2025.
Hacker News Exploits
Singapore
Apr 30, 2025
Cybersecurity researchers have revealed that RansomHubs online infrastructure has inexplicably gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomwareasaservice RaaS operation. Singaporean cybersecurity company GroupIB said that this may have caused affiliates to migr
Hacker News Exploits
China
Apr 30, 2025
A Chinaaligned advanced persistent threat APT group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversaryinthemiddle AitM attacks. Spellbinder enables adversaryinthemiddle AitM attacks, through IPv6 stateless address autoconfiguration SLAAC spo
Hacker News Exploits
SonicWall
May 1, 2025
SonicWall has revealed that two nowpatched security flaws impacting its SMA100 Secure Mobile Access SMA appliances have been exploited in the wild. The vulnerabilities in question are listed below CVE202344221 CVSS score 7.2 Improper neutralization of special elements in the SMA100 SSLVPN manageme
Hacker News Exploits
Microsoft
May 1, 2025
Enterprise data backup platform Commvault has revealed that an unknown nationstate threat actor breached its Microsoft Azure environment by exploiting CVE20253928 but emphasized there is no evidence of unauthorized data access. This activity has affected a small number of customers we have in common
Hacker News Exploits
Russia
May 1, 2025
Russian companies have been targeted as part of a largescale phishing campaign thats designed to deliver a known malware called DarkWatchman. Targets of the attacks include entities in the media, tourism, finance and insurance, manufacturing, retail, energy, telecom, transport, and biotechnology sec
Hacker News Exploits
SOC
May 1, 2025
Security Operations Center SOC teams are facing a fundamentally new challenge traditional cybersecurity tools are failing to detect advanced adversaries who have become experts at evading endpointbased defenses and signaturebased detection systems. The reality of these invisible intruders is drivin
Hacker News Exploits
ZTE
May 1, 2025
ZTE ZXV10 H201L RCE via authentication bypass
Exploit DB
Microsoft
May 1, 2025
Microsoft NTLM Hash Disclosure Spoofing libraryms
Exploit DB
Windows
Microsoft
May 1, 2025
Posted by hyp3rlinx on May 01 Credits John Page aka hyp3rlinx Website hyp3rlinx.altervista.org Source httpshyp3rlinx.altervista.orgadvisoriesMicrosoft_Windows_xrmms_File_NTLMHash_Disclosure.txt x.comhyp3rlinx ISR ApparitionSec Vendor www.microsoft.com Product .xrmms File Type Vulnerability Type
Full Disclosure
Broadcom
CISA
Apr 29, 2025
The U.S. Cybersecurity and Infrastructure Security Agency CISA on Monday added two highseverity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities KEV catalog, citing evidence of active exploitation in the wild. The vulnerabilities in
Hacker News Exploits
SentinelOne
China
Apr 29, 2025
Cybersecurity company SentinelOne has revealed that a Chinanexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its highvalue customers. We first became aware of this threat cluster during a 2024 intrusion conducted against an organization p
Hacker News Exploits
RAT
Russia
Apr 30, 2025
Cybersecurity researchers have shed light on a Russianspeaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid2022. RomCom employs advanced evasion techniques, including livingofftheland LOTL tactics and encrypted command and control
Hacker News Exploits
Windows
Microsoft
May 1, 2025
Microsoft Windows XRMMS File NTLM Information Disclosure Spoofing
Exploit DB
Apr 30, 2025
There was a post initially published in January 2022 showing an exploitable probable zeroday vulnerabilities1 for Sonicwall but looking back in what has been submitted in the past year to ISC, this past week was the first time we have been getting some reports. The activity occured on the 23 April 2
SANS Internet Storm Center
ISC Stormcast For Wednesday, April 30th, 2025 https://isc.sans.edu/podcastdetail/9430, (Wed, Apr 30th)
Apr 30, 2025
暂无内容
SANS Internet Storm Center
May 1, 2025
暂无内容
SANS Internet Storm Center
Apr 30, 2025
unzipstream 0.3.1 Arbitrary File Write
Exploit DB
Apr 30, 2025
As the field of artificial intelligence AI continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol MCP susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report fr
Hacker News Exploits
Apr 30, 2025
How Many Gaps Are Hiding in Your Identity System? Its not just about logins anymore. Todays attackers dont need to hack inthey can trick their way in. Deepfakes, impersonation scams, and AIpowered social engineering are helping them bypass traditional defenses and slip through unnoticed. Once inside
Hacker News Exploits
Apr 30, 2025
Everyone has cybersecurity stories involving family members. Heres a relatively common one. The conversation usually goes something like this The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were
Hacker News Exploits
Apr 30, 2025
Meta on Tuesday announced LlamaFirewall, an opensource framework designed to secure artificial intelligence AI systems against emerging cyber risks such as prompt injection, jailbreaks, and insecure code, among others. The framework, the company said, incorporates three guardrails, including PromptG
Hacker News Exploits
网安博客
标题
Tags
发布时间
摘要
来源
Android
Apr 28, 2025
利用netlink和nf_tables中的用后自由漏洞获取内核控制权深度分析Android恶意软件Triada的新迭代与感染机制GNU C库中的assert缓冲区溢出漏洞分析
腾讯玄武实验室
模糊测试
Apr 29, 2025
以太坊存款合同漏洞分析验证者的提款凭证风险细粒度差异化的JavaScript引擎模糊测试恒定时间代码中功率旁路漏洞的自动检测
腾讯玄武实验室
黑客
Apr 28, 2025
本周热点概览 热点资讯 5700万用户安装的Chrome扩展暗藏追踪代码 朝鲜黑客利用BlueK Read More
绿盟科技技术博客
零日漏洞
Apr 30, 2025
基于多模态学习的混淆隧道流量行为检测方案 by ourren 2024年在野零日漏洞利用分析上 by ourren 软件工厂关键技术分析及启示 by ourren 更多最新文章请访问 SecWiki
SecWiki News(国内外安全资讯)
勒索软件
日本
Apr 29, 2025
关键词勒索软件日立 Vantara 是日本跨国集团日立的子公司该公司上周末被迫关闭服务器以遏制 Akira
安全圈
英国
勒索软件
Apr 29, 2025
关键词勒索软件英国零售巨头玛莎百货 Marks Spencer 持续的宕机是由勒索软件攻击造成的据
安全圈
微软
Windows
May 1, 2025
关键词Windows7困扰Windows 7用户十余年的系统登录延迟谜团近日由微软官方揭晓答案
安全圈
木马
病毒
Apr 29, 2025
近期火绒安全情报中心监测到一款伪装成Clash代理工具的程序正在网络上传播经溯源分析这款恶意软件是由易语言编写的木马其开发者还提供私人定制易语言服务为他人的黑灰产活动提供支持目前火绒安全产品可对上述病毒进行拦截查杀
火绒安全实验室
密码喷洒攻击
黑客
Apr 28, 2025
Storm1977 黑客组织利用 AzureChecker CLI 工具通过密码喷洒攻击教育领域云租户劫持 200 多个容器用于加密货币挖矿
看雪学院
英国
黑客
Apr 30, 2025
英国零售巨头玛莎百货遭 Scattered Spider 黑客组织网络攻击致多系统瘫痪线上订单暂停运营受阻
看雪学院
邮件安全
病毒
Apr 28, 2025
企业邮箱如同数字城堡而邮件安全网关则是城墙上的智能哨兵它需精准拦截恶意钓鱼邮件病毒附件等外敌还要保证正常邮件高效流通然而面对硬件网关软件网关云网关三种哨兵形态企业如何精准匹配自身能力和需求并做出正确的选择 答案没有最好只有最合适本文将从形态优势和适用场景两大维度帮助企业找到最合适的邮件安全哨兵 三大形态对比你的企业适合哪种哨兵 1硬件网关本地部署的硬核卫士 优势 一站式安装部署由厂商提供全面的硬件软件和服务支持涵盖从采购到部署的全过程企业无需自行挑选和整合不同组件 数据本地化部署在企业内网数据不出本地满足对数据安全要求极高网络环境复杂的大型企业或涉密机构 适用场 景 适合对数据安全要求严
嘶吼
苹果
iOS
Apr 30, 2025
根据安全研究人员最新发现iOS系统的一个关键漏洞可能允许恶意应用程序仅用一行代码就永久禁用iphone该漏洞被命名为CVE202524091利用操作系统的达尔文通知系统触发无尽的重启周期有效地阻塞设备并需要完整的系统恢复 iOS Darwin通知漏洞 该漏洞利用了Darwin通知这是CoreOS层中的一种低级消息传递机制允许进程通信系统范围的事件 与NSNotificationCenter或NSDistributedNotificationCenter等更常见的通知系统不同Darwin通知是传统API的一部分在苹果操作系统的基础层面上运行 安全研究员Guilherme Rambo发现了这一漏洞
嘶吼
谷歌
苹果
小米
Apr 28, 2025
雷军回应小米手机重回第一人车家全生态 古尔曼苹果 Vision Pro 轻量版最早有望今年末上市 全球访问量最大网站 TOP20谷歌位居榜首YouTube 访问时长最长
极客公园
中国
中国移动
中国电信
Apr 29, 2025
4月28日在第八届数字中国建设峰会期间第二届长城杯信息安全铁人三项赛防护赛总决赛在福建福州举办本届大赛由中央网络安全和信息化委员会办公室教育部国家市场监督管理总局国家数据局指导中国信息安全测评中心北京师范大学中国电信集团有限公司中国移动通信集团有限公司联合主办第十二届全国政协副主席国家电子政务专家委员会主任王钦敏出席活动并致闭幕辞 第十二届全国政协副主席国家电子政务专家委员会主任王钦敏致辞 本届大赛以智能防护开启数字安全新时代为主题经过线上初赛半决赛的激烈角逐来自84所高校的100支参赛队伍近400名参赛学生会师总决赛 总决赛现场 福建省委常委常务副省长王永礼专程到比赛现场看望大赛组委会同志和
嘶吼
意大利
移动安全
社会工程学
Apr 29, 2025
一种名为SuperCard X的新型恶意软件即服务MaaS平台已经出现该平台通过NFC中继攻击安卓设备使销售点和ATM交易能够使用受损的支付卡数据 SuperCard X是由移动安全公司Cleafy发现的该公司报告称在意大利发现了利用这种安卓恶意软件的攻击这些攻击涉及多个具有细微差异的样本表明分支机构可以根据区域或其他特定需求定制构建 SuperCard X攻击是如何展开的 攻击开始时受害者会收到一条假冒银行的假短信或WhatsApp消息声称他们需要拨打一个号码来解决可疑交易引起的问题 接电话的是一名冒充银行客服人员的骗子他利用社会工程学欺骗受害者确认他们的卡号和密码然后他们试图说服用户通过他
嘶吼
网络钓鱼
钓鱼攻击
MFA
Microsoft
Apr 30, 2025
一种名为CookieBite的概念验证攻击利用浏览器扩展程序从 Azure Entra ID 中窃取浏览器会话 Cookie以绕过多因素身份验证MFA保护并保持对 Microsoft 365Outlook 和 Teams 等云服务的访问 此次攻击由 Varonis 安全研究人员设计他们分享了一种概念验证PoC方法涉及一个恶意的和一个合法的 Chrome 扩展程序然而窃取会话 cookie 并非新鲜事因为信息窃取程序和中间人网络钓鱼攻击通常都会将其作为目标 虽然通过窃取 Cookie 来入侵账户并非新手段但CookieBite技术中恶意 Chrome 浏览器扩展程序的使用因其隐秘性和持久性而值得
嘶吼
数据泄露
DoS攻击
DDoS攻击
Cisco
Verizon
Apr 29, 2025
IoT安全透视DLink DWR932B固件全面逆向分析 by ourren 2024年网络安全产业态势回顾及2025年趋势展望 by ourren 2024年暗网态势研究报告数据泄露趋势与治理挑战 by ourren 基于静态分析的路由器固件二进制漏洞挖掘经验分享 by ourren Verizon2025数据泄漏调查报告网络攻击越来越快准隐狠 by ourren DDoS攻击威胁报告2025版 by ourren Foundationsec Cisco Foundation AIs OpenSource Model by ourren 更多最新文章请访问 SecWiki
SecWiki News(国内外安全资讯)
远程代码执行
恶意代码
May 1, 2025
远程代码执行RCE是网络应用中最严重的漏洞之一允许攻击者通过恶意代码完全控制目标服务器文章探讨了RCE的工作原理漏洞发现方法真实案例及实用工具和有效载荷
不安全
HackerOne
Hacker
May 1, 2025
HackerOne因window.opener属性漏洞导致新标签页可访问原页面内容并重定向至恶意网站引发500赏金
不安全
SonicWall
会话劫持
May 1, 2025
SonicWall确认两个漏洞CVE202344221CVSS 7.2和CVE202438475CVSS 9.8正被积极利用前者允许远程认证攻击者注入OS命令后者可导致文件访问和会话劫持受影响设备包括SMA 100系列如SMA 200400等SonicWall已通过固件版本10.2.1.1062sv修复于2023年和10.2.1.1475sv修复于2024年修复问题
不安全
后门
中国
May 1, 2025
中国关联APT组织TheWizards利用IPv6 SLAAC功能发起中间人攻击劫持软件更新植入恶意软件 WizardNet后门
不安全
MFA
钓鱼攻击
Cisco
May 1, 2025
网络犯罪分子通过反向代理实施中间人攻击AiTM绕过多重身份验证MFA利用PhishingasaService工具包进行钓鱼攻击WebAuthn作为一种基于公钥加密的无密码MFA解决方案能有效防御此类攻击但其采用率仍低 Cisco Talos建议组织重新评估MFA策略以应对威胁
不安全
Windows
微软
Microsoft
May 1, 2025
Microsoft Windows的.xrmms文件允许注入XML样式表以泄露目标设备的NTLM哈希此漏洞影响多个Windows版本并可能绕过某些安全检查尽管已报告给微软但未得到修复
不安全
SonicWall
CISA
会话劫持
May 1, 2025
SonicWall披露其SMA100系列设备存在两个已修复的安全漏洞CVE202344221和CVE202438475分别影响SSLVPN管理和Apache服务器功能前者允许远程攻击者注入命令后者可能导致文件系统映射和会话劫持修复版本已发布并建议用户检查设备以防止未经授权访问CISA近期也将相关漏洞加入已知被利用列表中
不安全
数据泄露
零日漏洞
微软
May 1, 2025
Commvault披露其Azure环境遭未知国家支持的威胁行为者利用零日漏洞CVE20253928入侵,但无客户备份数据泄露微软于2月通知此事,Commvault已采取补救措施,并建议客户加强安全防护,如应用条件访问策略定期轮换密钥及监控特定恶意IP地址
不安全
后门
钓鱼攻击
俄罗斯
网络钓鱼
May 1, 2025
俄罗斯公司遭大规模网络钓鱼攻击使用DarkWatchman恶意软件针对媒体金融能源等多个行业该恶意软件具备键盘记录和系统信息收集功能同时乌克兰国防部门遭遇新后门Sheriff攻击该恶意软件可窃取数据并保持低调运行
不安全
数据泄露
波兰
俄罗斯
DoS攻击
DDoS攻击
May 1, 2025
波兰国家注册系统遭网络攻击致PESEL数据库短暂瘫痪影响身份验证及公共服务媒体称或为DDoS攻击但未确认来源数字部长称波兰常受网络攻击部分来自俄罗斯此次无数据泄露但影响税务申报等服务类似攻击在东欧频发
不安全
恶意代码
供应链攻击
May 1, 2025
Node.js的CI基础设施被发现存在严重漏洞攻击者可利用伪造Git时间戳绕过安全检查在Jenkins代理上执行恶意代码可能引发供应链攻击该漏洞源于TOCTOU问题影响数百万依赖Node.js的应用用户Node.js团队迅速修复并加强安全措施
不安全
钓鱼攻击
俄罗斯
May 1, 2025
Hive0117网络犯罪集团针对俄罗斯媒体旅游金融等行业的组织发起钓鱼攻击使用DarkWatchman恶意软件的新变种攻击通过伪装成公司邮件发送包含密码保护附件的邮件附件打开后触发恶意软件安装此次攻击于4月29日被检测到利用周末假期降低目标警惕性
不安全
黑客
瑞士
May 1, 2025
混沌奇点CoSin是瑞士黑客空间每年举办的会议2025年5月29日至6月1日在Biels的Villa Ritter举行活动包括讲座工作坊演示秀等涵盖技术政治艺术等领域费用42瑞郎含餐食参与者需报名并支付费用
不安全
XSS攻击
恶意脚本
Apr 30, 2025
文章描述了一次针对Yxcms_v1.4.6的存储型XSS攻击实验攻击者通过在留言本中注入恶意脚本成功触发目标网站管理员后台的XSS漏洞随后利用该漏洞植入Basic认证页面钓鱼载荷诱使管理员输入账号密码并将其窃取
不安全
Dec 29, 2100
渗透攻击超十年由于年龄身体原因自己感觉快要退出一线渗透攻击了遂打算把毕生所学用文字表写出来因为文章涉及到敏感的攻击行为所以好多需要打马赛克或者是本地以demo的形式表现出来当这个行业做久了你也终有一天发现原来事物的本质是如此重要比如内网渗透的本质是信息搜集当年某大佬把这条经验传递给我同样今天变成老家伙的我也希望把这条经验传递下去 文中一定会出现笔误或者不对的地方请大家多多包涵提前向各位说声对不起所有课程从基础开始包括工具的介绍应用等这样以后新来的同学或者想要自我从头学习的同学也可以避开一些弯路在写的过程中我深深体会到分享者才是学习中的最大受益者由于需要成文章所以需要查阅大量的资料在整个过程中又
专注APT攻击与防御
工业系统
标题
Tags
发布时间
摘要
来源
物联网
标题
Tags
发布时间
摘要
来源
Apr 30, 2025
Our friends at Beecham Research will be holding a webinar on Wednesday 7th May. The post Securing Enterprise IoT Blind Spots You Cant Afford appeared first on IoT Security Foundation .
IoT Security Foundation
企业安全
标题
Tags
发布时间
摘要
来源
Cisco
Apr 28, 2025
Foundation AI is a Cisco organization dedicated to bridging the gap between the promise of AI and its practical application in cybersecurity.
Cisco Security Blog
Apr 28, 2025
Foundation AIs first release Llama3.1FoundationAISecurityLLMbase8B is designed to improve response time, expand capacity, and proactively reduce risk.
Cisco Security Blog
XDR
Cisco
Apr 28, 2025
Clear verdict. Decisive action. AI speed. Cisco XDR turns noise into clarity and alerts into actionenabling confident, timely response at scale.
Cisco Security Blog
SOC
XDR
Cisco
Apr 29, 2025
Discover how Cisco XDRs Instant Attack Verification brings realtime threat validation for faster, smarter SOC response.
Cisco Security Blog
Apr 28, 2025
新闻速览 工信部CSTIS提醒防范WinRAR安全绕过漏洞的风险 第一季度159个CVE遭到野外利用近
安全牛
邮件安全
病毒
Apr 28, 2025
企业邮箱如同数字城堡而邮件安全网关则是城墙上的智能哨兵它需精准拦截恶意钓鱼邮件病毒附件等外敌还要
安全牛
Apr 29, 2025
新闻速览 2025年提升全民数字素养与技能工作要点印发提出营造安全有序数字环境 全球能源巨头成为目标
安全牛
Apr 30, 2025
新闻速览 工业和信息化部加快自动驾驶系统安全要求强制性国家标准研制 网络安全标准实践指南个人信息保
安全牛
Tenable
Apr 28, 2025
Each Monday, the Tenable Exposure Management Academy provides the practical, realworld guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CIO Patricia Grant looks at how the CIOCSO relationship is key to a successful exposure management program. Yo
Tenable Blog
Apr 30, 2025
Traditional approaches to cloud access rely on static, permanent permissions that are often overprivileged. Learn how justintime access completely changes the game. The access challenge in modern cloud environments As cloud adoption accelerates, organizations are grappling with a fundamental securit
Tenable Blog
Apr 30, 2025
MCP tools are implicated in several new attack techniques. Heres a look at how they can be manipulated for good, such as logging tool usage and filtering unauthorized commands. Background Over the last few months, there has been a lot of activity in the Model Context Protocol MCP space, both in term
Tenable Blog
邮件安全
病毒
Apr 28, 2025
企业邮箱如同数字城堡而邮件安全网关则是城墙上的智能哨兵它需精准拦截恶意钓鱼邮件病毒附件等外敌还要
安全牛
SAP
Apr 25, 2025
SAP has released outofband patch to address CVE202531324, a critical zeroday vulnerability in SAP NetWeaver that has been exploited by threat actors. Organizations are strongly encouraged to apply patches as soon as possible. Background On April 22, ReliaQuest published details of their investigatio
Tenable Blog
Tenable
Apr 25, 2025
Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Heres how Tenables Vulnerability Watch classification system can
Tenable Blog
木马
病毒
Apr 27, 2025
新闻速览 五一网络安全预警银狐木马病毒攻击再度来袭 LLM
安全牛
Cybersecurity Snapshot: Verizon DBIR Finds Attackers Feast on Vulnerability Exploits for Initial Access, While MITRE ATT&CK Adds Mobile, Cloud, ESXi Threat Intel
Tenable
Verizon
Apr 25, 2025
Check out highlights from this years Verizon DBIR, including a surge in zeroday exploits targeting edge devices and VPNs. Plus, find out whats new in the latest version of MITRE ATTCK. Also, see what Tenable webinar attendees said about AI security. And get the latest on ransomware preparedness for
Tenable Blog
移动安全
标题
Tags
发布时间
摘要
来源
- 作者:黑客驰
- 链接:https://hackerchi.top/article/HackerNews
- 声明:本文采用 CC BY-NC-SA 4.0 许可协议,转载请注明出处。
相关文章