Aggregator
75 дней на невозможное: почему сделка по TikTok зашла в тупик
‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely
A sophisticated new red team technique dubbed “RemoteMonologue” has emerged, enabling attackers to remotely harvest NTLM credentials without deploying malicious payloads or accessing the Local Security Authority Subsystem Service (LSASS). As traditional methods of credential theft face increasing scrutiny from advanced security measures and Endpoint Detection and Response (EDR) solutions, this technique represents a significant […]
The post ‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
网络钓鱼工具包现在实时验证受害者身份,然后窃取凭证
一图读懂 | 国家标准GB/T 45230-2025《数据安全技术 机密计算通用框架》
假冒的微软Office插件工具通过SourceForge推送恶意软件
OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements
The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone for one of the most widely-used open-source tools in secure communications. With significant protocol changes, security advancements, and new features, this version aims to provide enhanced protection and functionality for users worldwide. Key Security Improvements The OpenSSH 10.0 release introduces […]
The post OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Всего одна успешная атака — и вам придётся закрыть ИП
守护核心数据安全,CACTER EDLP助力某机械制造企业筑牢邮件防泄密防线
OpenSSH 10.0 释出
日本“官方安全援助”下的蒙古国雷达项目:我周边安全的新变数
朝鲜情报机构与网络战能力深度分析
AkiraBot:AI驱动的垃圾邮件机器人绕过验证码攻击超8万家网站
CVE-2025-30427 | Apple Safari Web Content use after free (Nessus ID 234072)
CVE-2025-24216 | Apple Safari Web Content memory corruption (Nessus ID 234072)
CVE-2025-30427 | Apple tvOS Web Content use after free (Nessus ID 234072)
CVE-2025-30427 | Apple iOS/iPadOS Web Content use after free (Nessus ID 234072)
CVE-2025-30427 | Apple macOS Web Content use after free (Nessus ID 234072)
CVE-2025-30427 | Apple visionOS Web Content use after free (Nessus ID 234072)
How to find out if your AI vendor is a security risk
One of the most pressing concerns with AI adoption is data leakage. Consider this: An employee logs into their favorite AI chatbot, pastes sensitive corporate data, and asks for a summary. Just like that, confidential information is ingested into a third-party model beyond your control. Even with data loss prevention (DLP) policies, AI data leaks are challenging to prevent. If the AI system is cloud-based and employees can access it externally, companies may never know … More →
The post How to find out if your AI vendor is a security risk appeared first on Help Net Security.