Aggregator
Major US Debt Collection Agency Radius Global Solutions Allegedly Breached, Employee HR Data and Client Information Exposed
Не отвечайте этому «эйчару»: как фальшивая вакансия может привести к утечке гостайны
CVE-2026-21531 | Microsoft Azure AI Language Authoring deserialization
CVE-2026-21533 | Microsoft Windows up to Server 2025 Remote Desktop Services privileges management
LummaStealer infections surge after CastleLoader malware campaigns
LangGraph SQLite Store $ne 操作符访问控制绕过漏洞分析
Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware
A sophisticated attack is targeting Windows Server systems using Prometei, a Russian-linked botnet that has been active since 2016. This multi-functional malware combines cryptocurrency mining, credential theft, and remote-control capabilities to maintain long-term access to compromised systems. The Prometei botnet infiltrates systems by exploiting weak or default credentials via Remote Desktop Protocol (RDP). Once attackers […]
The post Prometei Botnet Attacking Windows Server to Gain Remote Access and Deploy Malware appeared first on Cyber Security News.
Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released
A severe sandbox escape vulnerability has been discovered in the JavaScript library, enabling attackers to execute arbitrary code on host systems. The flaw, tracked as CVE-2026-25881 with a critical CVSS score of 8.3/10, affects all versions up to 0.8.30 and has been patched in version 0.8.31. The vulnerability exploits a weakness in SandboxJS’s protection mechanism. […]
The post Critical SandboxJS Vulnerability Allows Remote Host Takeover – PoC Released appeared first on Cyber Security News.
Январское разоблачение не помогло. Атака на цепочку поставок EmEditor переросла в долгоиграющий триллер
North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms
Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer
Cybercriminals have developed a sophisticated attack campaign that exploits user trust in artificial intelligence platforms to distribute the Atomic macOS Stealer (AMOS), marking a dangerous evolution in social engineering tactics. This new threat combines legitimate AI chatbot services from ChatGPT and Grok with paid Google advertising to lure unsuspecting Mac users into executing malicious terminal […]
The post Threat Actors Weaponize ChatGPT, Grok and Leverages Google Ads to Distribute macOS AMOS Stealer appeared first on Cyber Security News.
Kimwolf Botnet Swamps Anonymity Network I2P
Покажи аватарку — и я назову твою зарплату: ИИ научился предсказывать карьеру прямо по вашему лицу
Moscow moves to throttle Telegram as Kremlin pushes its own messaging app
Qilin
You must login to view this content
SecWiki News 2026-02-11 Review
更多最新文章,请访问SecWiki