Aggregator
诚邀渠道合作伙伴共启新征程
远控服务器孕育Node.js恶意脚本,依托以太坊完成远程操控
APT36 Launches New Cyber-Espionage Campaign on Indian Govt
APT36, also known as Transparent Tribe, has launched a new espionage campaign targeting government and defense institutions in India. This Pakistan-linked group, active since at least 2013, has long relied on phishing campaigns and...
The post APT36 Launches New Cyber-Espionage Campaign on Indian Govt appeared first on Penetration Testing Tools.
A Single Photo Can Hijack Your Apple Device: Inside a Critical 0-Click Exploit
The recent vulnerability in Apple’s ecosystem — CVE-2025-43300 — has emerged as one of the most dangerous threats to the company’s users. The flaw was identified in the RawCamera.bundle module, responsible for handling Adobe’s...
The post A Single Photo Can Hijack Your Apple Device: Inside a Critical 0-Click Exploit appeared first on Penetration Testing Tools.
2025年中国数据安全企业全景图征集启动
Detection Engineering: Practicing Detection-as-Code – Documentation – Part 4
2025年中国数据安全企业全景图征集启动
A ‘Legal’ Department for a Ransomware Gang? Inside the Bizarre World of Qilin’s Extortion Tactics
The Qilin group, notorious for its ruthless methods of digital extortion, has announced the creation of a so-called “legal department.” The very phrase sounds paradoxical: can one truly speak of a legal mechanism within...
The post A ‘Legal’ Department for a Ransomware Gang? Inside the Bizarre World of Qilin’s Extortion Tactics appeared first on Penetration Testing Tools.
The Phantom Attack: A New NTLM Relay Method Evades EDR to Hijack Networks
Logan Goins, a researcher at SpecterOps, has unveiled a novel technique for exploiting NTLM authentication that enables adversaries to bypass low-level access restrictions in corporate networks and offload tool execution from an infected workstation....
The post The Phantom Attack: A New NTLM Relay Method Evades EDR to Hijack Networks appeared first on Penetration Testing Tools.
SpAIware: The Stealthy Attack That Hides Malware in Your AI’s Memory
In the Windsurf Cascade development environment, designed for AI-driven code automation and programmer assistance, a vulnerability has been uncovered, dubbed SpAIware. This flaw allows malicious commands to be implanted into the AI system, stored...
The post SpAIware: The Stealthy Attack That Hides Malware in Your AI’s Memory appeared first on Penetration Testing Tools.
ИИ сказал: «Я тебя люблю. Давай сбежим вместе». Женщина поверила и отдала последнее.
用户数突破六万!美亚鉴真小程序守护人工智能安全防线
用户数突破六万!美亚鉴真小程序守护人工智能安全防线
近日,由国投智能股份全资子公司美亚柏科自主研发的“美亚鉴真平台”微信小程序用户数突破六万大关,这一里程碑标志着美亚柏科人工智能及AI内容检测识别技术的持续进步和用户的广泛认可。
欢迎大家扫描下图二维码
上传视频、图像
一起鉴真!
智能化时代,人工智能正快速向千行百业和日常生活中应用,推动经济社会高质量发展。值得注意的是,人工智能技术若被别有用心的个人和组织利用,会成为危害社会稳定、威胁个人安全、危害国家安全的“隐形武器”。
面对深伪合成与 AI 生成图片、视频带来的内容真实性挑战,公司自主研发的检测技术已构建起全面且精准的防御体系。平台可有效识别近500种各类伪造生成手段,广泛覆盖当前主流AI换脸、AI生成等方法。经领域多家专业厂家评测,美亚柏科视频图像鉴真能力,检测的精度、召回、速度等性能行业领先,为内容安全筑牢技术防线。
自互联网上线“美亚鉴真平台”微信小程序以来,目前已在全国13个省级、超100个地市级反诈及政务平台完成对接,成为全国唯一接入各类政务平台以及覆盖最广的深度合成生成内容检测小程序,并获得央视新闻专题报道和各地反诈中心部门的好评。
公司“鉴真”系列产品以多元化的业务模式,能够满足不同场景需求,用户可依据业务特性、数据规模及安全要求,灵活选择适配版本,获取定制化的AI合成生成内容检测解决方案:
·实验室装备版适配专业科研与鉴定场景;
·手机、平板、电脑等端侧SDK支持移动设备及终端应用的实时检测集成;
·私有服务版通过本地化部署,保障数据隐私与安全;
·SaaS化服务版以云端API实现低成本、高灵活的能力输出;
·互联网微信小程序则为个人用户及中小机构提供便捷的轻量化检测服务。
未来,国投智能股份将继续携手美亚柏科深耕生成式人工智能及AI内容检测识别技术,持续打磨推出更安全可靠的技术产品,为打击AI新型涉网犯罪提供技术支撑,助力AI健康发展与规范应用。
CVE-2025-9483 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 singlePortForwardAdd ruleName/schedule/inboundFilter stack-based overflow
CVE-2025-9482 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 portRangeForwardAdd ruleName/schedule/inboundFilter/TCPPorts/UDPPorts stack-based overflow
CVE-2025-9481 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 /goform/setIpv6 tunrd_Prefix stack-based overflow
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary spyware or SMS stealers. Initially, droppers served banking malware families that required elevated Accessibility permissions to harvest credentials. These small applications appeared innocuous at first glance, often masquerading as utility or government apps in high-risk […]
The post Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof appeared first on Cyber Security News.