Aggregator
Chaos勒索病毒:新兴的勒索软件即服务(RaaS)团队,启动语音欺诈和双重勒索攻击
Scattered Spider劫持VMware ESXi,向美国关键基础设施部署勒索软件
Windows 11资讯流迎来AI大升级:微软用“Copilot Discover”取代MSN新闻
钓鱼攻击新变种:“同形异字”绕过防御,AI助推风险升级
CERT 警告 Lakeside SysTrack 存在高危提权漏洞(CVE-2025-6241)
DragonForce
You must login to view this content
Мир узнал, что запутанность можно вернуть обратно. Время в квантовом мире можно «перематывать»
挪威开始在海底储存液化二氧化碳
Akira
You must login to view this content
Emora: An OSINT tool that allows you to search for accounts by username across social networks
[Control systems] CISA ICS security advisories (AV25-459)
45% кибергруппировок охотятся за Россией — не ради денег, а ради секретов
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), including the ability to extract and leak sensitive information cached by Apple Intelligence.
The post Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability appeared first on Microsoft Security Blog.
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to steal private data of files normally protected by Transparency, Consent, and Control (TCC), including the ability to extract and leak sensitive information cached by Apple Intelligence.
The post Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability appeared first on Microsoft Security Blog.
【技巧】SingleFile:我的网页文章保存方案
SecWiki News 2025-07-28 Review
更多最新文章,请访问SecWiki