Aggregator
Chrome紧急修复 WebGPU 和 V8引擎中的三个高危漏洞
NVIDIA App曝高危漏洞,紧急更新防黑客入侵!
本周职位更新!速速投简历
看雪双11·课程福利——满额赠《加密与解密》第五版(签名版)、VIP年卡、T恤等
SDC2025 议题回顾 | 大模型供应链安全的熵增效应:风险挖掘与熵减策略
欧洲学者建议欧洲摆脱对美国的网络安全依赖
绝密档案:最强网络攻击试图颠覆对立国家政权
欧洲学者建议欧洲摆脱对美国的网络安全依赖
绝密档案:最强网络攻击试图颠覆对立国家政权
每周蓝军技术推送(2025.11.1-11.7)
5 Signs Your Risk Register is Stuck in the Past
本周看什么 | 最近值得一看的 10 部作品
Youlog – 不是所有照片都该进系统相册,iOS 26 的时间线图片日志,1.2MB
警惕!APT-C-08(蔓灵花)组织首次借WinRAR漏洞CVE-2025-6218实施网络攻击
Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware
Datadog Security Research has uncovered a sophisticated supply chain attack targeting the npm ecosystem, involving 17 malicious packages across 23 releases designed to deliver the Vidar infostealer malware to Windows systems. The campaign, attributed to a threat actor cluster tracked as MUT-4831, represents a significant escalation in npm-based threats and marks the first known public […]
The post Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Маск — угроза демократии, а код на GitHub — фальшивка. Настоящий алгоритм X остается тайной
A.S.E 2.0 正式发布 | 开放生态 · 动静协同 · 让 AI 编程安全可量化
CCS'25 杰出论文奖: Web 应用越权漏洞检测新进展
Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets
Security researchers have developed a new technique that leverages call gadgets to insert arbitrary modules into the call stack during module loading, successfully bypassing Elastic EDR’s signature-based detection rules. Openness in Elastic EDR Detection Logic Elastic’s policy of transparency making its detection logic and payload testing tools publicly available has enabled the security community to […]
The post Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.