Aggregator
Microsoft Patch Tuesday security updates for November 2025 fixed an actively exploited Windows Kernel bug
鲁大师软件被发现会绕过北京地区投放推广
楼下跪了 7 天,大佬终于甩我一份 AI 时代秘籍
对话元理智能张帆:为什么「商业强化学习」,才是 AI To B 的新出路
74 минуты звука: история и устройство CD, ставшего музыкальным стандартом на десятилетия
ProxyBridge: Open-source proxy routing for Windows applications
ProxyBridge is a lightweight, open-source tool that lets Windows users route network traffic from specific applications through SOCKS5 or HTTP proxies. It can redirect both TCP and UDP traffic and gives users the option to route, block, or allow connections on a per-application basis. The tool operates at the kernel level using WinDivert, which means it works even with applications that are not proxy-aware. Users do not need to change any app settings or modify … More →
The post ProxyBridge: Open-source proxy routing for Windows applications appeared first on Help Net Security.
Synnovis Notifying UK Providers of Data Theft in 2024 Attack
British pathology laboratory services firm Synnovis has completed a forensics review of data stolen in a June 2024 ransomware attack and is notifying affected healthcare organizations. Those providers will be responsible for notifying their own affected patients, if deemed necessary, the firm said.
坦桑尼亚粮仓区为何儿童发育迟缓?
致命伪装:拆解藏匿于正常流量下的无声入侵
Shadow AI risk: Navigating the growing threat of ungoverned AI adoption
AI is transforming how businesses operate, but it’s also creating new, often hidden risks. As employees and business units eagerly embrace and experiment with AI solutions, many organizations are losing control over where and how AI is being used. A new threat is emerging: shadow AI. This unsanctioned use of AI tools without oversight from IT or security teams has quickly become a top concern for CISOs. According to Delinea’s 2025 AI in Identity Security … More →
The post Shadow AI risk: Navigating the growing threat of ungoverned AI adoption appeared first on Help Net Security.
CVE-2010-2134 | Http-solution Project Man up to 1.0 Login login.php Password sql injection (EDB-11584 / XFDB-56580)
CVE-2010-2137 | Giaard ProMan 0.1.0/0.1.1 center.php page code injection (EDB-11587 / XFDB-56575)
CVE-2010-2138 | Giaard ProMan 0.1.0/0.1.1 elisttasks.php _SESSION[userLang] path traversal (EDB-11587 / XFDB-56577)
CVE-2010-4845 | Mhproducts Projekt Shop details.php ilceler sql injection (EDB-15773 / XFDB-64205)
CVE-2010-1069 | ProArcadeScript game.php ID sql injection (EDB-11080 / BID-37703)
CVE-2010-3482 | Bouzouste Primitive CMS 1.0.9 cms_write.php sql injection (EDB-15064 / OSVDB-68154)
CVE-2010-3483 | Bouzouste Primitive CMS 1.0.9 cms_write.php access control (EDB-15064 / SA41515)
Как спрятать 1800-тонную ИИ-подлодку от всех радаров планеты? A26 шпионит, наносит удары и действует неделями без всплытия
Phishing Attack Impersonates Travel Brands Using 4,300 Malicious Domains
A Russian-speaking threat actor has orchestrated an extensive phishing campaign that has registered over 4,300 malicious domains targeting travelers since the beginning of 2025. The sophisticated operation customizes phishing pages to impersonate legitimate travel industry giants including Airbnb, Booking.com, Expedia, and Agoda, deceiving unsuspecting users into surrendering payment card information under the guise of hotel […]
The post Phishing Attack Impersonates Travel Brands Using 4,300 Malicious Domains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.