Aggregator
Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support
The Linux Kernel Runtime Guard (LKRG) is a kernel module that checks the Linux kernel while it’s running. It looks for signs of tampering and tries to catch attempts to exploit security flaws in the kernel. Because it’s a module and not a patch, LKRG can run on many different kernels without any changes to them. It works with versions going back to RHEL7 and its variants, as well as the latest mainline and distribution … More →
The post Linux Kernel Runtime Guard hits 1.0.0 with major updates and broader support appeared first on Help Net Security.
«Ты нарушила закон» — и 1,2 млн исчезло. Как мошенники обманули 13-летнюю москвичку и ограбили ее бабушку
乌克兰网络安全负责人谈俄罗斯黑客战术变化及美国网络援助
乌克兰网络安全负责人谈俄罗斯黑客战术变化及美国网络援助
DeepSeek冲击(含本地化部署实践)
Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data
The notorious Lazarus APT group has evolved its attack methodology by incorporating the increasingly popular ClickFix social engineering technique to distribute malware and steal sensitive intelligence data from targeted organizations. This North Korean-linked threat actor, internally tracked as APT-Q-1 by security researchers, has demonstrated remarkable adaptability by integrating deceptive user interface manipulation with their traditional […]
The post Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data appeared first on Cyber Security News.
Info Sec Unplugged [19] – Threat Int. (3a parte)
The TechBeat: Studies Show AI Agents and Browsers Are a Hacker’s Perfect Playground (9/8/2025)
土耳其限制大部分社交媒体
安全动态回顾|《国家密码管理局商用密码行政检查事项清单》发布 捷豹路虎遭遇网络攻击 生产零售受影响
黑客利用Sitecore零日漏洞部署WeepSteel侦察恶意软件
安全动态回顾|《国家密码管理局商用密码行政检查事项清单》发布 捷豹路虎遭遇网络攻击 生产零售受影响
黑客利用Sitecore零日漏洞部署WeepSteel侦察恶意软件
Cybersecurity research is getting new ethics rules, here’s what you need to know
Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, all submissions must include a stakeholder-based ethics analysis. Other major venues such as IEEE Security and Privacy, and ACM CCS have also emphasized the importance of ethical review in recent calls for papers. This change reflects a growing concern that cybersecurity research can unintentionally cause harm. Research that exposes vulnerabilities, collects … More →
The post Cybersecurity research is getting new ethics rules, here’s what you need to know appeared first on Help Net Security.
Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details
Tenable has confirmed a data breach that exposed the contact details and support case information of some of its customers. The company stated the incident is part of a broader data theft campaign targeting an integration between Salesforce and the Salesloft Drift marketing application, which has affected numerous organizations. In a public statement, Tenable expressed […]
The post Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details appeared first on Cyber Security News.
9,9 из 10 и финансовый шпионаж в SAP. Корпоративная ERP-система стала мишенью для хакеров по всему миру
企业注册资金实缴操作指南
InterceptSuite: Open-source network traffic interception tool
InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP, and custom protocols, and can manage unknown protocols and their TLS connections. Developed in C, it ensures efficient memory management and performance, utilising native SOCKS5 proxy support on Linux, Mac, and Windows, with OpenSSL for … More →
The post InterceptSuite: Open-source network traffic interception tool appeared first on Help Net Security.