Aggregator
Building a Security Portfolio Even When You're a Blue Teamer
10 months 3 weeks ago
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running
If you're a junior SOC analyst, a GRC specialist or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It's not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that - whether your job touches logs or legal frameworks.
If you're a junior SOC analyst, a GRC specialist or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It's not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that - whether your job touches logs or legal frameworks.
Czech Government Attributes Foreign Ministry Hack to China
10 months 3 weeks ago
APT31 Compromised the Czech Foreign Affairs Ministry in 2022
The Czech government on Wednesday said Chinese state hackers stole sensitive declassified information from the republic's foreign ministry as part of a years-long espionage campaign. Czech Ministry of Foreign Affairs attributed the hack to a Chinese nation-state group tracked as APT31.
The Czech government on Wednesday said Chinese state hackers stole sensitive declassified information from the republic's foreign ministry as part of a years-long espionage campaign. Czech Ministry of Foreign Affairs attributed the hack to a Chinese nation-state group tracked as APT31.
PumaBot Malware Targets Linux IoT Devices
10 months 3 weeks ago
Stealthy Malware Installs Cryptomining Software
A botnet targeting Internet of Things devices works by brute forcing credentials and downloading cryptomining software. Researchers call the botnet "PumaBot," since its malware checks for the string "Pumatronix," the name of a Brazilian manufacturer of surveillance and traffic camera systems.
A botnet targeting Internet of Things devices works by brute forcing credentials and downloading cryptomining software. Researchers call the botnet "PumaBot," since its malware checks for the string "Pumatronix," the name of a Brazilian manufacturer of surveillance and traffic camera systems.
CISA's Leadership Exodus Continues, Shaking Local Offices
10 months 3 weeks ago
'It's Just Totally Destabilizing,' Staffers Say Amid CISA's Leadership Exodus
An ongoing exodus of top officials and senior leadership at the Cybersecurity and Infrastructure Security Agency's regional offices has left staffers increasingly worried about a potential major shift in mission and continued cuts to staff and spending.
An ongoing exodus of top officials and senior leadership at the Cybersecurity and Infrastructure Security Agency's regional offices has left staffers increasingly worried about a potential major shift in mission and continued cuts to staff and spending.
A Peek Behind the Claude Curtain
10 months 3 weeks ago
Researcher Analyzes System Prompts to Show How New Claude Models Work
System-level instructions guiding Anthropic's new Claude 4 models tell it to skip praise, avoid flattery and get to the point, said independent AI researcher Simon Willison, breaking down newly released and leaked system prompts for the Claude Opus 4 and Sonnet 4 models.
System-level instructions guiding Anthropic's new Claude 4 models tell it to skip praise, avoid flattery and get to the point, said independent AI researcher Simon Willison, breaking down newly released and leaked system prompts for the Claude Opus 4 and Sonnet 4 models.
CRADLE: Open-Source CTI Platform for Collaborative Threat Analysis
10 months 3 weeks ago
CRADLE is an open-source web application designed to empower Cyber Threat Intelligence (CTI) analysts. The platform streamlines threat analysis workflows through collaborative note-taking, visual relationship mapping, and comprehensive report generation. In today’s rapidly evolving...
The post CRADLE: Open-Source CTI Platform for Collaborative Threat Analysis appeared first on Penetration Testing Tools.
ddos
DeepSeek R1模型升级,编程暴强;小鹏M03顶配上市,12.98万起;iOS或更名iOS 26 | 极客早知道
10 months 3 weeks ago
马斯克旗下 xAI 与通讯应用 Telegram 达成合作协议;荣耀确认进军机器人产业;腾讯音乐斥资 12.9 亿元,成韩国 SM 娱乐第二大股东
谛听 | Patty: 基于模式序列的未知工业控制协议语义分析
10 months 3 weeks ago
近日,“谛听”团队杨道青博士撰写的论文被国际期刊《IEEE Transactions on Information Forensics and Security》录用。
.NET 某文本编辑器老版本文件名设计缺陷实现文件上传
10 months 3 weeks ago
报名学习 | 国内最专业、最全面的 [ .NET 代码审计 ] 体系化视频学习课程
10 months 3 weeks ago
WebShell 对抗进化,规避w3wp进程树监测,黑屏之下绕过 cmd.exe 调用链静默执行
10 months 3 weeks ago
LSMS: Linux Security and Monitoring Scripts
10 months 3 weeks ago
Linux Security and Monitoring Scripts These are a collection of security and monitoring scripts you can use to monitor your Linux installation for security-related events or for an investigation. Each script works on its...
The post LSMS: Linux Security and Monitoring Scripts appeared first on Penetration Testing Tools.
ddos
[remote] SolarWinds Serv-U 15.4.2 HF1 - Directory Traversal
10 months 3 weeks ago
SolarWinds Serv-U 15.4.2 HF1 - Directory Traversal
[webapps] Campcodes Online Hospital Management System 1.0 - SQL Injection
10 months 3 weeks ago
Campcodes Online Hospital Management System 1.0 - SQL Injection
[webapps] WordPress Digits Plugin 8.4.6.1 - Authentication Bypass via OTP Bruteforcing
10 months 3 weeks ago
WordPress Digits Plugin 8.4.6.1 - Authentication Bypass via OTP Bruteforcing
[remote] Fortra GoAnywhere MFT 7.4.1 - Authentication Bypass
10 months 3 weeks ago
Fortra GoAnywhere MFT 7.4.1 - Authentication Bypass
[remote] Automic Agent 24.3.0 HF4 - Privilege Escalation
10 months 3 weeks ago
Automic Agent 24.3.0 HF4 - Privilege Escalation
[remote] Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure
10 months 3 weeks ago
Windows File Explorer Windows 11 (23H2) - NTLM Hash Disclosure
威努特助力云南某电池材料制备厂的安全建设实例
10 months 3 weeks ago
保障客户现场工业生产系统的安全,并为客户现场的运维提供便利。