Aggregator
【安全圈】未经身份验证的 DoS 漏洞导致 Windows 部署服务崩溃,目前尚无补丁
【安全圈】欧盟将于 2027 年禁止匿名加密账户和隐私币
【安全圈】微软才是“风险”!用户吐槽Win11强制启用BitLocker
Reddit CEO 称员工太理想主义而没有努力工作
Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection
Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance
The financial sector is heavily targeted by cybercriminals. Banks, investment firms, and credit unions are prime victims of attacks aimed at stealing sensitive data or holding it hostage for massive ransoms. One emerging threat in this landscape is Nitrogen Ransomware, a malicious group discovered in September 2024. It has since then been notoriously renowned for […]
The post Nitrogen Ransomware Exposed: How ANY.RUN Helps Uncover Threats to Finance appeared first on ANY.RUN's Cybersecurity Blog.
对二进制安全中沙盒的深入了解与分析(rop与shellcode集合)
Unsophisticated cyber actors are targeting the U.S. Energy sector
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization
Кликнул на акцию, продал квартиру — TDS делает фейк неотличимым от реальности
CVE-2025-20968 | Samsung Gallery prior 14.5.09.3/14.5.10.3/15.5.04.5 access control
CVE-2025-20967 | Samsung Gallery prior 14.5.09.3/14.5.10.3/15.5.04.5 access control
BlueVoyant introduces Continuous Optimization for Microsoft Security
BlueVoyant launched its Continuous Optimization for Microsoft Security (COMS) offering. COMS improves security outcomes, helps customers stay ahead of cyber threats, and minimizes technology costs by drawing on BlueVoyant’s expertise with the Microsoft Security stack. The Microsoft Security suite provides maximum cyber defense when it is properly configured, supplied with threat-responsive detections, and continuously optimized. However, many enterprises struggle to manage these solutions well at scale. BlueVoyant’s Continuous Optimization for Microsoft Security is designed to … More →
The post BlueVoyant introduces Continuous Optimization for Microsoft Security appeared first on Help Net Security.
FortiGuard Labs发布报告:网络威胁日渐自动化和迅捷
FortiGuard Labs发布报告:网络威胁日渐自动化和迅捷
Researchers Simulate DPRK’s Largest Cryptocurrency Heist Through Compromised macOS Developer and AWS Pivoting
Security researchers at Elastic have recreated the intricate details of the February 21, 2025, ByBit cryptocurrency heist, where approximately 400,000 ETH-valued at over a billion dollars-was stolen. Attributed to North Korea’s elite cyber unit, TraderTraitor, this attack exploited a trusted vendor relationship with Safe{Wallet}, a multisig wallet platform, turning a routine transaction into one of […]
The post Researchers Simulate DPRK’s Largest Cryptocurrency Heist Through Compromised macOS Developer and AWS Pivoting appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.