Aggregator
以梦为马,不负韶华,T00ls给您拜年了,祝大家2026新春快乐,策马扬鞭,顶峰相见,内附第二版红包封面
Top Security Incidents of 2025: Lazarus Group’s Cryptocurrency Heist
Event Summary In February 2025, the North Korea-linked APT group Lazarus launched a highly sophisticated supply chain attack against the prominent cryptocurrency exchange Bybit, successfully stealing over 400,000 ETH and stETH—valued at approximately $1.5 billion. This incident marks the largest single security breach in the global cryptocurrency sector to date. The attack exposed critical vulnerabilities […]
The post Top Security Incidents of 2025: Lazarus Group’s Cryptocurrency Heist appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post Top Security Incidents of 2025: Lazarus Group’s Cryptocurrency Heist appeared first on Security Boulevard.
Google patches first Chrome zero-day exploited in attacks this year
CVE-2026-2574 | glib-networking OpenSSL Backend g_tls_client_connection_openssl_get_property null pointer dereference
CVE-2026-0929 | RegistrationMagic Plugin up to 6.0.2.1 on WordPress authorization
300 тысяч краж за три месяца. Банк России отчитался о рекордном всплеске активности мошенников
Critical BeyondTrust Vulnerability Exploited in the Wild to Gain Full Domain Control
A critical vulnerability tracked as CVE-2026-1731 is being actively exploited in the wild, enabling attackers to gain full domain control over affected systems. Threat actors are leveraging this flaw to execute operating system commands remotely without authentication. The flaw, discovered in self-hosted BeyondTrust deployments, allows unauthenticated attackers to run arbitrary OS commands via specially crafted HTTP requests, executing […]
The post Critical BeyondTrust Vulnerability Exploited in the Wild to Gain Full Domain Control appeared first on Cyber Security News.
GPT-4 официально – душнила. Модель усложняет жизнь даже тогда, когда ее об этом не просят
«Может быть вне досягаемости современной математики». Семь задач, которые не решит даже ИИ
G.O.S.S.I.P 2026 新春总动员(2):黑胶唱片,启动!
Бегство, рейды и отсутствие денег на еду: что происходит, когда власти Камбоджи объявили охоту на интернет-мошенников
Security at AI speed: The new CISO reality
The CISO role has changed significantly over the past decade, but according to John White, EMEA Field CISO, Torq, the most disruptive shift is accountability driven by agentic AI. In this Help Net Security interview, White explains how security leaders must design and govern hybrid workforces where humans and AI agents operate side by side, making decisions and acting at scale. He notes that automation is moving beyond simple task execution into real-time insight and … More →
The post Security at AI speed: The new CISO reality appeared first on Help Net Security.
AI and RaaS Alter Threat Landscape, New Ransomware Groups Grow by 30%
AI automation, RaaS, a significant bump in vulnerability disclosures, and a rise in new ransomware gangs are reshaping the threat landscape and forcing defenders to change strategies.
The post AI and RaaS Alter Threat Landscape, New Ransomware Groups Grow by 30% appeared first on Security Boulevard.