Aggregator
AI 安全攻防实战:大厂大模型从提示词注入到 XSS弹cookie
Microsoft Adds Wi-Fi-Based Work Location Auto-Detection to Teams
Microsoft is preparing to introduce a groundbreaking feature in Teams that will revolutionise how hybrid workers manage their presence information. The new capability will automatically identify and update users’ work locations by detecting their connection to organisational Wi-Fi networks, eliminating the need for manual status updates. Scheduled for deployment in December 2025, this opt-in functionality […]
The post Microsoft Adds Wi-Fi-Based Work Location Auto-Detection to Teams appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
用友U8Cloud所有版本NCCloudGatewayServlet命令执行漏洞分析
Can your earbuds recognize you? Researchers are working on it
Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step could be inside the ear. New research explores how the ear canal’s unique acoustic properties can be used to verify identity through wireless earbuds. Their system, called EarID, shows that ear canal scanning could one day become a practical security method for mobile devices. Illustration of ear canal scanning/sensing. The user inserts the earbuds to … More →
The post Can your earbuds recognize you? Researchers are working on it appeared first on Help Net Security.
North Korean Chollima Actors Added BeaverTail and OtterCookie to its Arsenal
Famous Chollima, a DPRK-aligned threat group, has evolved its arsenal, with BeaverTail and OtterCookie increasingly merging functionalities to steal credentials and cryptocurrency via deceptive job offers. A recent campaign involved a trojanized Node.js application distributed through a malicious NPM package, highlighting the group’s adaptation in delivery methods. In the campaign, Famous Chollima notes merged BeaverTail […]
The post North Korean Chollima Actors Added BeaverTail and OtterCookie to its Arsenal appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
How Proxy Servers Enhance Security in Modern Authentication Systems
Learn how proxy servers enhance authentication security by filtering traffic, supporting MFA, enabling Zero Trust, and protecting against cyber threats.
The post How Proxy Servers Enhance Security in Modern Authentication Systems appeared first on Security Boulevard.
供应链攻击进入新阶段: 自我传播的 GlassWorm 蠕虫席卷开发者生态系统
金融信创必看!破万亿资管巨头鹏华基金:用CACTER守护邮件安全
近期,《2025 年金融信创研究报告》引发行业关注,报告明确国资委划定的 “2027 年底前国有金融机构须完成全系统信创改造”时间表。从2020年启动至今,金融信创已从“摸着石头过河”进入“批量攻坚”阶段——2022年第三批试点名单落地后,包括鹏华基金在内的百余家金融机构中,超70%已完成核心系统替换。而在这场改造中,看似基础的邮件系统安全,成了不少金融机构的“首战拦路虎”。
鹏华基金信创首战:邮件安全为何是关键点?
邮件系统之所以成为金融信创的 “首战难点”,核心在于邮件系统既是连接内外的 “神经中枢”,又是安全风险的 “高频入口”——日均上万封邮件流转量背后,藏着海量敏感信息,一旦失守轻则数据泄露、重则业务系统被入侵。
作为管理超万亿资产的“老十家”公募,鹏华基金管理有限公司(以下简称“鹏华基金”)2022年入选第三批试点后率先启动邮件系统改造,最先直面这一行业共性难题:一是政策合规高压下,原有非信创网关面临“断供”风险;二是因依赖传统规则库,旧网关面对新型钓鱼攻击根本无力防御。这个承载核心业务的“第一入口”,成为鹏华基金信创改造中必须攻克的关键关卡。
解法落地:CACTER信创邮件安全网关三重优势
鹏华基金通过POC测试,最终选定CACTER信创邮件安全网关(以下简称“CACTER网关”),以“适配强、拦截准、运维省”三大优势,成功破解邮件安全的“首战难题”:
一、国产化适配“零门槛”,信创替代平滑过渡
金融信创的核心是“可用、好用”。CACTER网关已深度适配国产化生态,与鲲鹏、海光、龙芯等国产CPU,达梦、人大金仓等数据库,统信、麒麟等操作系统均实现无缝兼容。基于此,鹏华基金无需重构底层架构,仅通过协议迁移与配置调试,将旧网关逐步替换为CACTER网关,全程未影响日常邮件流转,真正做到了“零感知”过渡。
二、独家域内收发信检测+反钓鱼双引擎,精准拦截新型威胁
针对金融行业高频钓鱼攻击,CACTER网关凭借独家域内收发信检测模型,为鹏华基金核心部门邮件账户“画像”,通过为薪酬、财务等关键部门建立常态化的发信行为基线,能敏锐识别出任何偏离“画像”的异常邮件。一旦发现诸如仿冒HR在非工作时间群发“工资条”等异常行为,系统将联动反垃圾引擎进行精准拦截与处置。上线后,鹏华基金的钓鱼/垃圾邮件拦截率可达99.8%,误判低于0.02%,邮箱再也没有仿冒的“管理员通知”“福利补贴津贴领取”出现。
三、运维管理“轻”操作,省心降本更高效
鹏华基金日均处理大量合作函件、监管报表及内部通知,运维需兼顾畅通与安全。CACTER网关的便捷运维与管理界面恰好契合需求:可视化日志实时展示拦截数据,IT无需额外工具,5分钟掌握当日攻击趋势;遇到仿冒“鹏华域名”攻击时,通过可视化界面勾选关键词即可更新规则;合作方、监管邮件输入域名一键加白,不影响员工收信。运维从“盯屏幕”转为“查策略”,高效又省心。
成效显现:三年稳定运行,拦截率与可靠性双验证
“跟CACTER合作3年以来,网关的拦截率一直都很高。特别在HW期间,高强度的攻击也被稳稳挡住,系统运行十分稳定。”
——鹏华基金IT负责人,满意度:9分
从试点探索到批量攻坚,金融信创的推进之路离不开扎实的技术支撑。鹏华基金以邮件安全改造为切口,用CACTER网关交出了一份“适配稳、拦截准、运维省”的答卷。这份答卷背后,是CACTER深耕反垃圾反钓鱼26年的技术积淀,更是100+金融机构信创改造案例的实战验证。
面向2027年全系统信创改造的关键节点,CACTER 将持续以技术创新为核心,陪伴更多金融机构走好信创转型之路,守好每一封邮件的安全防线,护航金融业务的稳健发展。
Top IT Asset Management Companies
Discover the top IT asset management companies of 2025. Compare Alloy, ServiceNow, Ivanti, Freshworks, and SysAid to find the best ITAM solution for your business.
The post Top IT Asset Management Companies appeared first on Security Boulevard.
Трамп дожал Китай: Алгоритмы и код TikTok передадут США в этот четверг
Tenda AC6缓冲区溢出漏洞 CVE-2025-25343 浅析
Dependency-Track: Open-source component analysis platform
Software is a patchwork of third-party components, and keeping tabs on what’s running under the hood has become a challenge. The open-source platform Dependency-Track tackles that problem head-on. Rather than treating software composition as a one-time scan, it continuously monitors every version of every application, giving organizations a live view of risk across their entire portfolio. By leaning on the power of Software Bills of Materials (SBOMs), it delivers insight and precision. Built with developers … More →
The post Dependency-Track: Open-source component analysis platform appeared first on Help Net Security.