Aggregator
铠侠称其 2026 年产能已经售罄
叮!您的新年「惊喜盒子」正在派送中
BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records
A high-severity vulnerability has been disclosed in BIND 9, the widely used DNS server software responsible for domain name resolution across millions of internet services. The vulnerability, tracked as CVE-2025-13878, enables remote attackers to crash DNS servers by sending specially crafted, malformed DNS records, potentially disrupting critical internet infrastructure and organizational services. The vulnerability stems […]
The post BIND 9 Vulnerability Allow Attackers to Crash Server by Sending Malicious Records appeared first on Cyber Security News.
New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads
Security researchers have identified a sophisticated multi-stage malware campaign targeting Windows systems through social engineering and weaponized cloud services. The attack employs business-themed documents as deceptive entry points, luring users into extracting compressed archives containing malicious shortcuts that execute PowerShell commands in the background. Once initiated, the infection chain systematically neutralizes Microsoft Defender before delivering […]
The post New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads appeared first on Cyber Security News.
Critical Vulnerability in Binary-Parser Library for Node.js Allows Malicious Code injection
A critical code-injection vulnerability has been identified in the Node.js binary-parser library, affecting all versions before 2.3.0. The flaw allows attackers to execute arbitrary JavaScript code if untrusted input is used to construct parser definitions, potentially compromising application integrity and system security. The binary-parser library, designed to facilitate writing efficient binary parsers in a simple, […]
The post Critical Vulnerability in Binary-Parser Library for Node.js Allows Malicious Code injection appeared first on Cyber Security News.
У Claude теперь есть «характер». Anthropic написала конституцию для своего ИИ (и это не список запретов)
100+场攻防演练沉淀!360破解超60%政企单位核心安全痛点
【赠pixel 1代手机】看雪安卓高级研修班(月薪一万计划)
AI助力单人一周开发出高危Linux恶意软件VoidLink
堆学习:Unlink attack
【漏洞通告】GNU InetUtils Telnetd远程身份验证绕过漏洞(CVE-2026-24061)
Malicious PyPI Package Impersonates SymPy, Deploys XMRig Miner on Linux Hosts
白俄业余无线电操作人员面临死刑惩罚
Common Apple Pay scams, and how to stay safe
美国NASA测试利用区块链技术确保航空系统网络安全
AI一周开发出高级恶意软件,网络犯罪一人产业链开始出现?
AAAI 2026 新加坡|共探可信可控的下一代AI智能体
大模型时代下WebShell的新型绕过技术(超详版)
Critical Chainlit AI Vulnerabilities Let Hackers Gain Control Over Cloud Environments
Cybersecurity researchers have uncovered two critical security flaws in Chainlit, a widely used open-source AI framework with over 700,000 monthly downloads. The vulnerabilities allow attackers to steal sensitive cloud credentials, leak database files, and take control of enterprise AI environments without user interaction. Zafran Labs identified these flaws affecting internet-facing deployments across enterprises. Both vulnerabilities […]
The post Critical Chainlit AI Vulnerabilities Let Hackers Gain Control Over Cloud Environments appeared first on Cyber Security News.