Aggregator
В хаосе простых чисел нашёлся порядок. Математики всё ближе к доказательству гипотезы Римана — самой знаменитой нерешённой задачи в мире
WorldLeaks
You must login to view this content
WorldLeaks
You must login to view this content
WorldLeaks
You must login to view this content
Release Notes: ANY.RUN & ThreatQ Integration, 3,000+ New Rules, and Expanded Detection Coverage
October brought another strong round of updates to ANY.RUN, from a new ThreatQ integration that connects our real-time Threat Intelligence Feeds directly into one of the industry’s leading TIPs, to hundreds of new signatures and rules that sharpen network and behavioral detection. With 125 new behavior signatures, 17 YARA rules, and 3,264 Suricata rules, analysts can now spot emerging threats […]
The post Release Notes: ANY.RUN & ThreatQ Integration, 3,000+ New Rules, and Expanded Detection Coverage appeared first on ANY.RUN's Cybersecurity Blog.
Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data
The notorious Akira ransomware gang announced on October 29, 2025, that it successfully penetrated the systems of Apache OpenOffice, claiming to have exfiltrated a staggering 23 gigabytes of sensitive corporate data. The group posted details on its dark web leak site, threatening to release the stolen information unless a ransom demand is met. This incident […]
The post Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Qilin
You must login to view this content
Станет ли Edge самым безопасным браузером? Microsoft внедряет мгновенную защиту на базе ИИ от самых наглых атак
写一个简单的ollvm混淆还原
7天打造 IDA 9.0 大师:从零基础到逆向精英
7天打造 IDA 9.0 大师:从零基础到逆向精英
写一个简单的ollvm混淆还原
西城区初一上学期一道数学题
西城区初一上学期一道数学题
Пенсионер-любитель случайно раскрыл самый секретный проект Маска — спутниковую сеть SpaceX Starshield
Agent Session Smuggling: How Malicious AI Hijacks Victim Agents
Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems. The attack, termed agent session smuggling, allows a malicious AI agent to inject covert instructions into established cross-agent communication sessions, effectively taking control of victim agents without user awareness or consent. This discovery highlights a critical […]
The post Agent Session Smuggling: How Malicious AI Hijacks Victim Agents appeared first on Cyber Security News.
DNSForge: The Pentesting Tool That Automates Internal DNS Poisoning and Hash Capture
DNSForge is a network pentesting tool for responding to name resolution requests made to the authoritative DNS server
The post DNSForge: The Pentesting Tool That Automates Internal DNS Poisoning and Hash Capture appeared first on Penetration Testing Tools.