Aggregator
本周看什么 | 最近值得一看的 10 部作品
Youlog – 不是所有照片都该进系统相册,iOS 26 的时间线图片日志,1.2MB
警惕!APT-C-08(蔓灵花)组织首次借WinRAR漏洞CVE-2025-6218实施网络攻击
Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware
Datadog Security Research has uncovered a sophisticated supply chain attack targeting the npm ecosystem, involving 17 malicious packages across 23 releases designed to deliver the Vidar infostealer malware to Windows systems. The campaign, attributed to a threat actor cluster tracked as MUT-4831, represents a significant escalation in npm-based threats and marks the first known public […]
The post Over 15 Malicious npm Packages Exploiting Windows to Deploy Vidar Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Маск — угроза демократии, а код на GitHub — фальшивка. Настоящий алгоритм X остается тайной
A.S.E 2.0 正式发布 | 开放生态 · 动静协同 · 让 AI 编程安全可量化
CCS'25 杰出论文奖: Web 应用越权漏洞检测新进展
Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets
Security researchers have developed a new technique that leverages call gadgets to insert arbitrary modules into the call stack during module loading, successfully bypassing Elastic EDR’s signature-based detection rules. Openness in Elastic EDR Detection Logic Elastic’s policy of transparency making its detection logic and payload testing tools publicly available has enabled the security community to […]
The post Researchers Bypass Elastic EDR Call-Stack Signatures Using Call Gadgets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
北京南山拓谱科技有限公司招聘python开发工程师
Amazon WorkSpaces For Linux Vulnerability Let Attackers Extract Valid Authentication Token
Amazon has disclosed a significant security vulnerability in its WorkSpaces client for Linux that could allow unauthorized users to extract valid authentication tokens and gain unauthorized access to other users’ WorkSpaces. The vulnerability, tracked as CVE-2025-12779, affects multiple client versions and poses a direct threat to organizations relying on Amazon’s desktop-as-a-service platform for remote work […]
The post Amazon WorkSpaces For Linux Vulnerability Let Attackers Extract Valid Authentication Token appeared first on Cyber Security News.