Aggregator
黑客利用“rn”拼写欺诈手段,在新型钓鱼攻击中仿冒微软与万豪
Mac 用户警惕:“MacSync”恶意软件诱导你“亲手”入侵自己的设备
CVE-2026-22822:External Secrets Operator严重漏洞破坏命名空间隔离机制
Industry, government, nonprofits weigh voluntary rules for commercial hacking tools
The weekend discussion about the next step of the Pall Mall Process revealed some of the topics rules-writers will have to weigh.
The post Industry, government, nonprofits weigh voluntary rules for commercial hacking tools appeared first on CyberScoop.
Google推出「个人智能」AI模式,打造专属个性化搜索体验
Microsoft 365全球宕机事件:2026年1月22日多国业务停摆
GNU InetUtils telnetd严重漏洞可让攻击者绕过登录获取root权限
Tengu
You must login to view this content
NightSpire
You must login to view this content
Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies
闲置主机 + 白嫖Claude:零成本打造7x24小时的AI牛马
Cable cuts, storms, and DNS: a look at Internet disruptions in Q4 2025
Зачем писать сложные коды, если можно просто позвонить? Как выглядит киберпреступность эпохи «созвонов»
Stellar Cyber expands Autonomous SOC capabilities with agentic AI
Stellar Cyber announced updates in version 6.3 that advance its goal of an autonomous SOC. Powered by agentic AI, the release helps security teams reduce alert volume and improve response by automating threat detection, investigation, triage, and response across identity, network, endpoint, email, and cloud environments. With 6.3, Stellar Cyber delivers measurable customer value by reducing analyst workload, shortening mean time to respond (MTTR), and unifying security operations through deeper automation, smarter context, and expanded … More →
The post Stellar Cyber expands Autonomous SOC capabilities with agentic AI appeared first on Help Net Security.
26th January – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 26th January, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES RansomHub ransomware group has claimed responsibility for a cyber-attack on Luxshare, an electronics manufacturer of Apple, Nvidia, LG, Tesla, and others. The threat actors claimed access to 3D CAD models, circuit board […]
The post 26th January – Threat Intelligence Report appeared first on Check Point Research.