Aggregator
专家观点 | 提升数字时代社会安全治理水平
专家解读|张凌寒:从制度破冰到体系完善 AI生成内容标识打造可信网络空间
论坛·原创 | 美国对华人工智能遏制政策的演变与启示
U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog
Любите петь глупые песни в машине? Поздравляем, ваш видеорегистратор уже продал эти кадры корпорациям
10 Best Attack Surface Management (ASM) Companies in 2025
Attack Surface Management (ASM) is a proactive cybersecurity discipline that helps organizations identify, analyze, and remediate all of their internet-facing assets and potential vulnerabilities. It goes beyond traditional vulnerability scanning to find and continuously monitor unknown or unmanaged assets, such as rogue cloud instances, misconfigured APIs, and shadow IT, that attackers use as entry points. […]
The post 10 Best Attack Surface Management (ASM) Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Security
Stealthy attack serves poisoned web pages only to AI agents
AI agents can be tricked into covertly performing malicious actions by websites that are hidden from regular users’ view, JFrog AI architect Shaked Zychlinski has found. This novel approach allows attackers to inject prompts / instructions into these autonomous AI-powered “assistants”, allowing them to hijack agent behavior for their own malicious goals. Indirect prompt-injection poisoning attacks where hidden harmful instructions are embedded inside the same page the human visitor sees will rarely be detected by … More →
The post Stealthy attack serves poisoned web pages only to AI agents appeared first on Help Net Security.
Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover
A critical security flaw in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited by attackers, according to research from SecurityBridge. The vulnerability, which carries a CVSS score of 9.9 out of 10, allows a low-privileged user to execute code injection and gain full control of an SAP system. Organizations running SAP S/4HANA on-premise or […]
The post Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.