Aggregator
一款可实时篡改支付二维码的木马程序分析
银狐系Winos4远控平台深度剖析:载荷生成、插件驻留与通信模型
Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds
ИИ попросили поработать реверсером. Получилось так себе (но прогресс всё равно пугает)
Best Enterprise SSO Providers for EdTech/Education SaaS in 2026
Discover the best enterprise SSO providers for EdTech and Education SaaS in 2026, comparing security, scalability, compliance, and integrations.
The post Best Enterprise SSO Providers for EdTech/Education SaaS in 2026 appeared first on Security Boulevard.
Child exploitation, grooming, and social media addiction claims put Meta on trial
Landmark trials now underway allege Meta failed to protect children from sexual exploitation, grooming, and addiction-driven design.
The post Child exploitation, grooming, and social media addiction claims put Meta on trial appeared first on Security Boulevard.
HUSTOJ 开源在线评测系统多处漏洞审计分析 (CVE-2026-23873 & CVE-2026-24479)
VNCTF 2026 web方向部分解
记一次某管理服务器审计拿下CNVD高危证书过程
DeepAudit源码深度解析
Алло, мы ищем таланты (и пароли). Хакеры устроили самый дорогой спектакль в Zoom
Google Warns of Hackers Leveraging Gemini AI for All Stages of Cyberattacks
Threat actors have begun leveraging Google’s Gemini API to dynamically generate C# code for multi-stage malware, evading traditional detection methods. The Google Threat Intelligence Group (GTIG) detailed this in its February 2026 AI Threat Tracker report, spotlighting the HONESTCUE framework first observed in September 2025. HONESTCUE operates as a downloader and launcher that queries Gemini’s […]
The post Google Warns of Hackers Leveraging Gemini AI for All Stages of Cyberattacks appeared first on Cyber Security News.