Aggregator
CVE-2025-64095
CVE-2025-38352
Дожили: ЕС вводит "право на живого человека" как базовое право потребителя
报告称波兰语最容易被 AI 理解
AI Pulse: How Big Tech Impacts AI Bot Traffic
Fresh insights from old data: corroborating reports of Turkmenistan IP unblocking and firewall testing
朝鲜Kimsuky APT组织针对韩国最新攻击活动分析
Hackers are attacking Britain’s drinking water suppliers
豆包,正在悄悄开启「电商新链路」
⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
Don’t let Congress punt on cyber insurance reform
The cyber incidents in the headlines aren’t acts of cyber terror.
The post Don’t let Congress punt on cyber insurance reform appeared first on CyberScoop.
Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
In October 2025, threat researchers at Cyble Research and Intelligence Labs uncovered a sophisticated cyber attack leveraging weaponized military documents to distribute an advanced SSH-Tor backdoor targeting defense sector personnel. The campaign centers on a deceptively simple delivery mechanism: a ZIP archive disguised as a Belarusian military document titled “ТЛГ на убытие на переподготовку.pdf” (TLG […]
The post Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files appeared first on Cyber Security News.
Pear
You must login to view this content
Каждый «приватный чат» вашего ребёнка — потенциальная вербовка в террор. Онлайн-культ "764" вербует детей в идеологию страданий
Hackernoon: How AI Phishing Is Putting Schools at Risk
This article was originally published in Hackernoon on 10/29/25 by Charlie Sander. AI is super-charging social engineering, and K-12 is still a precious target With an average of 2,739 edtech tools per district, staff and students rely heavily on laptops and classroom tech that must be protected from the latest threats. Today, these include anything from convincing ...
The post Hackernoon: How AI Phishing Is Putting Schools at Risk appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K-12.
The post Hackernoon: How AI Phishing Is Putting Schools at Risk appeared first on Security Boulevard.
North Korean Hackers Caught on Video Using AI Filters in Fake Job Interviews
How to Align with the NIST CSF 2.0 | Accelerating Growth with CyberStrong
For today’s enterprises, cybersecurity maturity is a key growth enabler. The organizations that thrive are those that treat cybersecurity not as a box to check, but as a business accelerator, an integrated part of strategic planning and performance. Aligning with the NIST Cybersecurity Framework (CSF) helps achieve precisely that. It enables leaders to mature their cybersecurity posture, proactively manage risk, and scale operations with confidence as threats and regulations evolve.
The post How to Align with the NIST CSF 2.0 | Accelerating Growth with CyberStrong appeared first on Security Boulevard.