Aggregator
FreeBuf早报 | DeepSeek本地化部署是否安全?新的Tiny FUD正针对macOS用户
美蒙合作新动向:我方如何应对这场地缘政治“大戏”?
情报高手秘籍:从数据搬运到决策预判的进阶之路
CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25
CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers, and other edge devices against cyber threats. This collaborative guidance, supported by leading international cybersecurity organizations, aims to address vulnerabilities in hardware that form the backbone of critical infrastructure and operational networks worldwide. Edge devices—like […]
The post CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
OpenNHP: Cryptography-driven zero trust protocol
OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data. OpenNHP offers the following benefits: Reduces attack surface by hiding infrastructure Prevents unauthorized network reconnaissance Mitigates vulnerability exploitation Stops phishing via encrypted DNS Protects against DDoS attacks Enables fine-grained access control Provides identity-based connection tracking Attack attribution “The OpenNHP proposed a cost-effective way to solve the vulnerability problem. The common way to mitigate vulnerabilities is … More →
The post OpenNHP: Cryptography-driven zero trust protocol appeared first on Help Net Security.
工商总局对谷歌发起反垄断调查
SparkCat恶意活动利用OCR技术窃取加密货币钱包恢复短语
Отравление данных в ИИ: возможные угрозы, их обнаружение и профилактика
回家过年,长辈不催婚,反向我「安利 AI」!
OFAC и open-source: Linux Foundation раскрывает тонкости работы под санкциями США
The API security crisis and why businesses are at risk
In this Help Net Security video, Ivan Novikov, CEO of Wallarm, discusses the 2025 API ThreatStats Report, highlighting how APIs have become the primary attack surface over the past year, mainly driven by the rise of AI-related risks. Researchers identified 439 AI-related CVEs—a staggering 1,025% increase from the previous year. 99% were linked to APIs, with vulnerabilities including injection flaws, misconfigurations, and emerging memory corruption issues caused by AI’s reliance on high-performance binary APIs. In … More →
The post The API security crisis and why businesses are at risk appeared first on Help Net Security.
揭秘ValleyRAT恶意软件攻击活动,疑似与银狐组织有关
揭秘ValleyRAT恶意软件攻击活动,疑似与银狐组织有关
11 лет в погоне за призраками Вселенной: учёные поймали след антиматерии
Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code – Update Now
The Google Chrome team has officially released Chrome 133, now available on the stable channel for Windows, Mac, and Linux. This update, version 133.0.6943.53 for Linux and 133.0.6943.53/54 for Windows and Mac, brings a host of improvements and critical security fixes. Users are strongly urged to update their browsers immediately to protect against newly discovered […]
The post Chrome Use-After-Free Vulnerabilities Let Attackers Execute Remote Code – Update Now appeared first on Cyber Security News.