Aggregator
一起读书
BrotherHood
You must login to view this content
Russia’s Sandworm hackers deploying wipers against Ukraine’s grain industry
RALord
You must login to view this content
Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage operations against government entities and think tanks. Recent analysis reveals that threat actors are leveraging Visual Studio Code extensions and GitHub as command-and-control infrastructure to deliver multi-stage malware payloads capable of deploying ransomware and conducting […]
The post Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Bypass Mode: Taking Down SSL Pinning in Web Apps
Content-Security-Policy: The Web Tester’s Headache
Бизнесы на $1 миллиард, где работают 2-3 человека и много ИИ: Сэм Альтман предсказал конец традиционной экономики в "ближайшие годы"
【翻译】Part 1: 使用AI 进行交易到底靠不靠谱?
Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes
In the early hours of November 3, 2025, Check Point Research’s blockchain threat monitoring systems flagged a suspicious pattern on the Ethereum mainnet. The alert stemmed from Balancer V2’s Vault contract, which soon revealed one of the most devastating DeFi vulnerabilities to date. Before defenders could intervene, attackers had siphoned $128.64 million from Balancer ComposableStablePool […]
The post Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes
On November 3, 2025, blockchain security monitoring systems detected a sophisticated exploit targeting Balancer V2’s ComposableStablePool contracts. An attacker executed a precision loss vulnerability to drain $128.64 million across six blockchain networks in under 30 minutes. The attack leveraged a rounding error in the _upscaleArray function combined with carefully crafted batchSwap operations, allowing the attacker […]
The post Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes appeared first on Cyber Security News.
Prowler embeds AI directly into security workflows
Prowler launched Prowler Lighthouse AI, an intelligent security assistant and MCP Server, that brings autonomous AI directly into DevSecOps workflows. Available immediately, Prowler’s AI innovations combine agentic reasoning with automation to accelerate risk analysis, streamline compliance and guide teams through faster remediation across multi-cloud environments. This dual launch marks a defining moment for Prowler, establishing it as the first open cloud-security platform to embed AI at the core of security workflows. Cloud security at AI … More →
The post Prowler embeds AI directly into security workflows appeared first on Help Net Security.
AWS Security: The Basics With Buckets
Gemini теперь пишет вирусы в режиме "на лету". И меняет код каждый час
Devman
You must login to view this content
Devman
You must login to view this content
Devman
You must login to view this content