Aggregator
Стейблкоин зла: почему Tether идеален для преступлений на миллионы долларов
CVE-2012-2612 | SAP NetWeaver 7.0 disp+work.exe DiagTraceHex memory corruption (EDB-20705 / ID 121196)
Russian Hackers Exploit WiFi in Sophisticated New Attack
A Russian cyberespionage group hacked a Washington, D.C.-based organization focused on Ukraine by deploying a new attack technique that exploits Wi-Fi connectivity, according to new research. The "nearest neighbor attack: methodology could lead to a significant broadening of targeting and attacks.
Crosspoint to Invest $5M in Each Innovation Sandbox Finalist
Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively.
Experts Urge Sober Assessment of Russian Hacking
A warning from a British government official over the Russian cyberwar sparked a backlash from cybersecurity specialists who urged a measured approach. Russian attacks could "turn the lights off for millions of people," said Pat McFadden, minister for intergovernmental
Mysterious Elephant Using Hajj-Themed Bait in Attacks
A South Asian threat actor identified as Mysterious Elephant or APT-K-47 by Knownsec 404 researchers is using a Hajj-themed lure to trick victims into malicious payload disguised as a Windows file. The hacker is using upgraded Asyncshell malware disguised as a Microsoft Compiled HTML Help file.
CISA Releases Six Industrial Control Systems Advisories
CISA released six Industrial Control Systems (ICS) advisories on November 26, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-331-01 Schneider Electric PowerLogic PM55xx and PowerLogic PM8ECC
- ICSA-24-331-02 Schneider Electric PowerLogic P5
- ICSA-24-331-03 Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 Safety PLCs
- ICSA-24-331-04 Hitachi Energy MicroSCADA Pro/X SYS600
- ICSA-24-331-05 Hitachi Energy RTU500 Scripting Interface
- ICSMA-24-200-01 Philips Vue PACS (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
Проект Convoy: Neuralink тестирует управление протезами силой мысли
沙龙报名|“智效融合,安全护航”·西安站 第八期「度安讲」 技术沙龙来了!
Linux Kernel 6.13将支持显示卡住的任务数 帮助管理员判断故障情况
Open-Weather APT: Updates to the Web Based NOAA APT Image Decoder
喝更多水有益健康
估值 1548亿美元!网安AI市场将迎来爆炸性增长
Intruder Launches Intel: A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
常戴耳机会损伤听力吗?你应该了解的听力测试与保护知识
昨天微软又全球宕机11小时,多项核心服务无法使用
谷歌开发者计划推出Premium高级会员 每年299美元但加赠最高1000美元云额度
Black Friday shoppers targeted with thousands of fraudulent online stores
Building fake, fraudulent online stores has never been easier: fraudsters are registering domain names for a pittance, using the SHOPYY e-commerce platform to build the websites, and leveraging large language models (LLMs) to rewrite existing product listings to perfect their search engine performance. “We first observed LLM-generated retail product descriptions in July 2024, and similar behaviors continue into the holiday shopping season,” Netcraft Software Engineering Team Lead Will Barnes has shared. From August to October … More →
The post Black Friday shoppers targeted with thousands of fraudulent online stores appeared first on Help Net Security.