Aggregator
Покажи аватарку — и я назову твою зарплату: ИИ научился предсказывать карьеру прямо по вашему лицу
Moscow moves to throttle Telegram as Kremlin pushes its own messaging app
Qilin
You must login to view this content
SecWiki News 2026-02-11 Review
更多最新文章,请访问SecWiki
How Service Behavior Changes in Remote Locations
«Админ всё потерял, переходим в новый чат». Если увидите такое сообщение — бегите (или хотя бы не вводите код)
波兰电网攻击曝光工控设备砖化致命威胁
Insomnia
You must login to view this content
Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
A massive wave of exploitation attempts has followed the disclosure of CVE-2026-1281, a critical pre-authentication Ivanti EPMM vulnerability, the Shadowserver Foundation has warned. Some of it is automated scanning for vulnerable systems, but according to Greynoise and Defused, a suspected initial access broker has been prepping unpatched instances with a “sleeper” webshell for follow-on exploitation by other threat actors. “On February 9, Defused Cyber reported a campaign deploying dormant in-memory Java class loaders to compromised … More →
The post Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells appeared first on Help Net Security.
Думали, 2FA — это панацея? Как бы не так, если вам звонит очень убедительный робот
Reynolds ransomware uses BYOVD to disable security before encryption
Microsoft begins Secure Boot certificate update for Windows devices
Microsoft has begun updating Secure Boot certificates originally issued in 2011 to ensure that Windows devices continue to verify boot software as older certificates reach the end of their lifecycle and begin expiring in June 2026. How Secure Boot certificate updates work For most individuals and businesses that allow Microsoft to manage updates, the new certificates will install automatically with monthly Windows updates, requiring no additional action. For specialized systems, such as servers and IoT … More →
The post Microsoft begins Secure Boot certificate update for Windows devices appeared first on Help Net Security.
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Archive.today 对博主发动 DDoS 攻击,维基百科考虑将其屏蔽
CodeHunter expands behavioral intent analysis to secure the software supply chain
CodeHunter is expanding its behavioral intent technology beyond traditional malware analysis to address supply chain risk and security decision-making across the software development lifecycle (SDLC). According to a recent Gartner report, “software supply chains transcend organizational boundaries and consist of external entities in addition to internal systems.” Gartner also warns that “improper artifact integrity validation allows attackers to poison the software delivery pipeline and compromise the software being delivered”. Originally built to overcome the limitations … More →
The post CodeHunter expands behavioral intent analysis to secure the software supply chain appeared first on Help Net Security.
AI Rising: Do We Know Enough About the Data Populating It?
YouTube в коме: Роскомнадзор удалил домены хостинга из DNS-базы
Agent狂欢与Palantir爆红背后:智能化软件正在“凤凰涅槃”
Kong launches Context Mesh to turn enterprise APIs into agent-ready tools
Kong has announced Kong Context Mesh, a product that automatically discovers enterprise APIs, transforms them into agent-consumable tools, and deploys them with runtime governance. “Organisations have spent years building APIs as the nervous system of the enterprise. Context Mesh allows them to reuse that investment to power agents instead of starting from scratch,” said Marco Palladino, CTO of Kong. “The challenge is that agents are only as good as the enterprise context they can reach. … More →
The post Kong launches Context Mesh to turn enterprise APIs into agent-ready tools appeared first on Help Net Security.