Aggregator
Salesloft: GitHub Account Breach Was Ground Zero in Drift Campaign
首届CCF智能汽车大赛(CCF IVC 2025) 汽车安全攻防赛writeup
Signal наконец-то «продался»: теперь за приватность придётся платить
彭鑫老师将在QECon大会上作主旨演讲《基于大模型的智能化开发:复杂系统视角下的一点思考和探索》
CVE-2025-8085
CVE-2024-58240
CVE-2025-9566
CVE-2025-52861
CVE-2025-52856
CVE-2025-42957
CVE-2024-30088
Интернет по паспорту и скану лица. Теперь «Великий Файрвол» можно купить как сервис, с доставкой и установкой.
MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT remote access trojan to compromise Windows systems. The malware leverages advanced evasion techniques and installs legitimate remote access tools like AnyDesk and TightVNC to maintain persistent, covert access to infected machines. The attack begins with carefully crafted phishing emails targeting […]
The post MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
[他山之石] 2025年国家社会科学基金立项名单——图情档、民族学和考古学
Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact
Jaguar Land Rover’s UK factories will remain closed until at least Wednesday as the company continues to recover from a cyberattack that struck its systems on 31 August. The carmaker shut down its IT networks in response to the breach, halting production at its Halewood and Solihull plants, Wolverhampton engine facility, and sites in Slovakia, […]
The post Jaguar Land Rover Halts Operations Longer Due to Cyberattack Impact appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Сверхбыстрый интернет, квантовые компьютеры и новые методы меддиагностики - одно открытие объединило будущее этих технологий
New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability
A new exploitation method has been discovered for the Linux kernel use-after-free (UAF) vulnerability tracked as CVE-2024-50264. The vulnerability was awarded the Pwnie Award 2025 for Best Privilege Escalation due to its complexity and impact on major Linux distributions. Researchers developed innovative techniques to bypass kernel slab allocator and race condition protections, making exploitation much more feasible than […]
The post New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
如何有效防范网络钓鱼攻击
Signal adds secure backup option for chat history
Losing a phone can mean losing years of conversations. Signal is rolling out a new secure backup feature to help users keep their messages safe without giving up privacy. The problem with lost chats Signal has long avoided cloud backups because they create privacy risks. Storing chats on a company’s servers can expose personal data if that service is hacked or pressured by governments. Until now, Signal only allowed local backups stored on a user’s … More →
The post Signal adds secure backup option for chat history appeared first on Help Net Security.