Aggregator
Government and industry must work together to secure America’s cyber future
At this very moment, nation-state actors and opportunistic criminals are looking for any way to target Americans and undermine our national security. Their battlefield of choice is cyberspace. Cybersecurity is the preeminent challenge of our time, and threats to our networks impact far more than just our data––they impact the resilience of our communities, the […]
The post Government and industry must work together to secure America’s cyber future appeared first on CyberScoop.
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
In mid-2025, Secureworks Counter Threat Unit (CTU) researchers uncovered a sophisticated cyber campaign where Chinese state-sponsored threat actors from the BRONZE BUTLER group exploited a critical zero-day vulnerability in Motex LANSCOPE Endpoint Manager to gain unauthorized access to corporate networks and extract sensitive data. The discovery marks another chapter in a long-running pattern of exploitation […]
The post Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
复旦大学、清华大学等 | 超越漏洞扫描:一种功能性变更驱动的远程软件版本识别方法
Facial Recognition Firm Clearview AI Hit with Criminal Complaint in Austria
25 000 часов под нагрузкой. В России испытали сталь для атомных реакторов нового поколения.
美国网络靶场发展演进过程和趋势特点分析
警惕!供水、储油、储粮等多类关基工控设施的设置遭到篡改
Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads
A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free and open-source Command and Control framework originally designed for legitimate penetration testing and red team operations. Security researchers have uncovered a disturbing trend where advanced threat actors deploy this extensible post-exploitation tool across global ransomware campaigns, transforming a utility meant […]
The post Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads appeared first on Cyber Security News.
WhatsApp Implements Passkey System to Boost Backup Privacy
WhatsApp has announced a significant security upgrade that makes protecting your chat backups simpler and more secure than ever before. The messaging platform is introducing passkey-encrypted backups, a new feature that eliminates the need for complicated passwords or lengthy encryption keys. Instead, users can now protect their backups using their fingerprint, face recognition, or screen […]
The post WhatsApp Implements Passkey System to Boost Backup Privacy appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
获香港特区政府致谢!360为构建“粤港澳大湾区网络安全共同体”贡献力量
360斩获IDC报告三类“大满贯”,引领智能安全新范式
速通秘籍来咯!VMProtect虚拟机逆向入门
2025大厂技术岗实时更新!企业新增职位汇总
谷歌沉默以对,Chromium漏洞曝光!数十亿用户面临浏览器崩溃风险
VmProtect.3.0.0beta分析之虚拟机流程
CVE-2025-12357 | ISO 15118-2 Network and Application Protocol Requirements communication channel to intended endpoints (icsa-25-303-01 / EUVD-2025-37371)
CVE-2025-11843 | Therefore Corporation Therefore Online/Therefore On-Premises up to 2025 authentication spoofing (EUVD-2025-37320)
NIS2 Enhances Vulnerability Management Practices
The NIS2 Directive has driven significant improvements in vulnerability management across Europe. Organizations are accelerating vulnerability discovery by engaging with crowdsourced security communities and ethical hackers, said Ed Parsons, chief operations officer at Intigriti.