Aggregator
创业一定要多记录
创业一定要多记录
How China and North Korea Are Industrializing Zero-Days
John Hultquist, chief analyst at Google Threat Intelligence Group, Google Cloud, discussed how China and North Korea are transforming cyberattacks into organized, factory-like operations. Alongside zero-day exploits, North Korean IT operatives are quietly infiltrating Fortune 500 companies under false identities.
AI's Double-Edged Sword in Software Development
AI can significantly accelerate code generation - helping developers go from idea to implementation in minutes - but AI-generated code is frequently based on insecure or flawed examples found in public code repositories, explains Chenxi Wang, founder and general partner at Rain Capital.
AI Narrows the Cyber Gap Between Attackers and Defenders
Advances in scalable AI and agentic technologies are creating a long-awaited shift in the defender-offender dynamic. With autonomy and agentic capabilities entering production, CISOs may soon deploy 100,000 autonomous agents instead of hiring more staff, said Dave DeWalt, CEO of NightDragon.
数字青春,榜样力量!360漏洞云五四特别直播回顾!
数字青春,榜样力量!360漏洞云五四特别直播回顾!
MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques
MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool in the arsenal of multiple threat actors, including the notorious TAG-124 (LandUpdate808) and SocGholish groups. This malware, identified in phishing and drive-by download campaigns, employs advanced evasion techniques to bypass traditional security measures, making it a persistent challenge for defenders. MintsLoader’s […]
The post MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
微软签名的 XOML 工具,通过 Sharp4LoadXOML 执行任意命令绕过安全防护
.NET 安全基础入门学习知识库
福利|推荐两款 .NET Web 实战工具,助力攻防对抗
Prepare to Start Implementing Quantum-Safe Algorithms
Quantum computing is at a tipping point, moving from theoretical math to deployable physics, said Jon France, CISO at ISC2. So, security teams need to start addressing the implementation of quantum-safe algorithms now, beginning with the five new safe algorithms released by NIST.
How China and North Korea Are Industrializing Zero-Days
John Hultquist, chief analyst at Google Threat Intelligence Group, Google Cloud, discussed how China and North Korea are transforming cyberattacks into organized, factory-like operations. Alongside zero-day exploits, North Korean IT operatives are quietly infiltrating Fortune 500 companies under false identities.
AI's Double-Edged Sword in Software Development
AI can significantly accelerate code generation - helping developers go from idea to implementation in minutes - but AI-generated code is frequently based on insecure or flawed examples found in public code repositories, explains Chenxi Wang, founder and general partner at Rain Capital.
AI Narrows the Cyber Gap Between Attackers and Defenders
Advances in scalable AI and agentic technologies are creating a long-awaited shift in the defender-offender dynamic. With autonomy and agentic capabilities entering production, CISOs may soon deploy 100,000 autonomous agents instead of hiring more staff, said Dave DeWalt, CEO of NightDragon.
Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA
Cybercriminals are intensifying their efforts to undermine multi-factor authentication (MFA) through adversary-in-the-middle (AiTM) attacks, leveraging reverse proxies to intercept sensitive data. As phishing tactics grow more advanced, traditional defenses like spam filters and user training are proving insufficient. Attackers deploy reverse proxies as intermediary servers to forward victim traffic to legitimate websites, creating an illusion […]
The post Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
巴菲特正式卸任 CEO;「小包免税」政策取消,多国停止美国供货;80%「00 后」接受「AI 婚姻」 | 极客早知道
Fennec: Artifact collection tool for *nix systems
Fennec fennec is an artifact collection tool written in Rust to be used during an incident response on *nix based systems. fennec allows you to write a configuration file that contains how to collect...
The post Fennec: Artifact collection tool for *nix systems appeared first on Penetration Testing Tools.
seekr: multi-purpose toolkit for gathering and managing OSINT-Data
Seekr Seekr is a multi-purpose toolkit for gathering and managing OSINT-data with a sleek web interface. Our desktop view enables you to have all of your favorite OSINT tools integrated into one. The backend...
The post seekr: multi-purpose toolkit for gathering and managing OSINT-Data appeared first on Penetration Testing Tools.