Aggregator
Ivanti端点管理器中的关键路径穿越漏洞(CVE-2024-10811、CVE-2024 -13161、CVE-2024-13160和CVE-2024-13159
新的ValleyRAT恶意软件变体通过虚假Chrome下载传播
Фейковая «Безопасность»: Telegram-аккаунты снова крадут через сообщения
CISA tags Microsoft .NET and Apache OFBiz bugs as exploited in attacks
Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968)
XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181, CVE-2024-57968) in VeraCore software, a popular solution for warehouse management and order fulfillment. According to Intezer and Solis Security researchers, their targets are companies in the manufacturing and distribution sectors. “In one instance, the group was found to have compromised an organization in 2020, maintaining persistent access to an endpoint for over four years,” Intezer … More →
The post Cybercrime gang exploited VeraCore zero-day vulnerabilities for years (CVE-2025-25181, CVE-2024-57968) appeared first on Help Net Security.
Sophisticated Phishing Campaign Targets Ukraine’s Largest Bank
Dynatrace公布人工智能、安全和开发人员工具更新
BADBOX Botnet Surges: Over 190,000 Android Devices Infected, Including LED TVs
The BADBOX botnet, a sophisticated malware operation targeting Android-based devices, has now infected over 192,000 systems globally. Originally confined to low-cost and off-brand devices, the malware has expanded its reach to include well-known brands such as Yandex 4K QLED TVs and Hisense smartphones. This alarming development highlights the growing risks of supply chain vulnerabilities in […]
The post BADBOX Botnet Surges: Over 190,000 Android Devices Infected, Including LED TVs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Attackers Target Education Sector, Hijack Microsoft Accounts
Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks
The AI startup DeepSeek has gained significant attention in recent weeks for its advanced AI models, particularly the R1 reasoning model. However, this rapid rise to fame has also attracted the unwanted attention of cybercriminals, who are exploiting DeepSeek’s popularity to launch sophisticated cyber attacks. These threats include fake websites, malware distribution, and scams involving […]
The post Threat Actors Exploiting DeepSeek’s Rise To Fuel Cyber Attacks appeared first on Cyber Security News.
RansomHub
这版华筝很好
SecWiki News 2025-02-05 Review
DeepSeek崛起背后的暗流:全球AI技术博弈下的DDoS攻击 by ourren
使用FEP(完全加密协议)隐藏协议元数据 by ourren
面向暗网抑制的普适性安全理论研究构想和成果展望 by ourren
更多最新文章,请访问SecWiki