Aggregator
微软裁员约九千人,游戏业务深受影响
VPN против прокси: техническое сравнение двух технологий защиты данных
专项活动第二期|欢迎询价
CVE-2004-1326 | Ultrix Dxterm 4.5 -setup memory corruption (EDB-698 / XFDB-18613)
Israel Based Access to 78 Servers Listed for Sale on Darknet Forum
You must login to view this content
CVE-2006-0312 | Mike Helton aoblogger 2.3 create.php uza privileges management (EDB-27106 / XFDB-24143)
8.8 из 10: критическая уязвимость ставит под угрозу сотни тысяч WordPress-сайтов
CVE-2014-2996 | XCloner 3.5 Privileges index2.php dbbackup_comp code injection (EDB-32790)
天文学家可能发现了已知第三个星际天体
NimDoor: North Korean APT Uses Nim-Based Malware for Stealthy Web3 & Crypto Attacks on macOS
A threat group linked to the Democratic People’s Republic of Korea (DPRK) is intensifying its attacks on companies operating in the Web3 and cryptocurrency sectors, deploying malware crafted in the Nim programming language. These...
The post NimDoor: North Korean APT Uses Nim-Based Malware for Stealthy Web3 & Crypto Attacks on macOS appeared first on Penetration Testing Tools.
TOAD Attacks Surge: Reverse Phishing Campaigns Trick Victims into Calling Scammers for RAT Delivery
Telephone-based fraud schemes masquerading as customer support from well-known brands are rapidly gaining traction among cybercriminals. According to researchers at Cisco Talos, attackers are increasingly employing a method known as TOAD (Telephone-Oriented Attack Delivery),...
The post TOAD Attacks Surge: Reverse Phishing Campaigns Trick Victims into Calling Scammers for RAT Delivery appeared first on Penetration Testing Tools.
Qantas Data Breach: Up to 6 Million Customers’ Personal Info Exposed in Third-Party Contact Centre Attack
Australian airline Qantas has suffered a significant cybersecurity incident after malicious actors gained access to a third-party platform containing customer data, the company announced on Monday evening. Qantas, the nation’s largest carrier—operating both domestic...
The post Qantas Data Breach: Up to 6 Million Customers’ Personal Info Exposed in Third-Party Contact Centre Attack appeared first on Penetration Testing Tools.
蝉联领导者!Fortinet再获Gartner企业级WWLAN魔力象限认可
专注推动网络与安全融合的全球性综合网络安全解决方案供应商Fortinet,近日宣布,在2025年Gartner®企业级有线和无线局域网基础设施魔力象限™报告评选中,连续第二年蝉联领导者殊荣。
这一权威认可充分彰显了Fortinet业界领先安全局域网边缘产品组合的强大实力。该产品组合囊括FortiSwitch、FortiAP等安全组网解决方案,支持无缝集成至Fortinet Security Fabric安全平台,由统一操作系统FortiOS提供强劲支撑,实现网络与安全的全面融合。
相较后期增强安全部署的传统组网解决方案,Fortinet企业级有线和无线局域网产品组合,原生集成AI驱动的安全能力和AI辅助的网络运营优势于一体。这种创新的融合方法赋能用户简化运营流程、提升网络性能,并将安全性从IT环境无缝延伸至复杂的OT环境。
Fortinet Secure LAN Edge(安全局域网边缘)产品组合提供以下关键优势,全方位满足用户不断变化的组网和安全需求:
1、全面覆盖的局域网边缘集成安全性,有效降低网络风险:用户部署FortiAI即可轻松构建集安全性与AI辅助管理于一体的直观架构。Fortinet为用户提供灵活、简化的许可模式,有效消除了管理众多附加订阅所带来的繁琐与复杂性。
2、借助统一平台实现更强大的IT与OT融合:随着企业对网络需求的不断提升,以及网安人才短缺挑战日益严峻,依赖数量有限的资源维护和保护网络变得愈发困难。Fortinet统一平台解决方案能够有效缓解这一负担,避免错误配置,简化日常运营,并跨有线和无线局域网解决方案提供 AI 驱动的安全洞察。
3、统一功能与灵活许可机制,有效降低成本和复杂性:Fortinet企业级有线和无线局域网解决方案提供企业级灵活性,可按需选择产品功能,降低网络风险和运维成本,简化操作流程。
上述业内领先功能均由统一操作系统FortiOS交付,为跨组网与安全域的Fortinet Security Fabric安全平台提供强劲支持。
用户认可:连续第七次“客户之选”
2024年,Fortinet 连续第七次在 Gartner® Peer Insights™ 企业级有线和无线局域网基础设施“客户之声”评选中荣获“客户之选”称号。
Goodwill Industries of Middle Tennessee IT 副总裁 Ed O'Kelley评价表示:“我们选择 Fortinet 的一个关键原因在于,其组网工具自设计之初便融入了安全性。借助 Fortinet 解决方案,我们的网络速度得以显著提升。以往我们经常收到来自最终用户的性能投诉,部署 Fortinet 组网解决方案后,投诉直降为零。”
Jersey Mike's Franchise Systems,Inc. 首席信息官 Scott Scherer 评价认为:“相比市场其他同类产品,FortiAP 可用性更高,基于单一平台管理,操作更简便。我们曾考虑过部署非托管接入点设备,但当我们看到 FortiAP 与 Fortinet Security Fabric 安全平台的紧密集成优势后,便毫不犹豫地选择了这款产品。我们希望 FortiSwitch 和 FortiAP 能够协同工作,为我们的团队描绘出成熟、全面的安全图景。”
Fortinet 全面集成至 Fortinet Security Fabric 的企业级有线和无线局域网解决方案,为用户打造经实践检验、以人工智能驱动的安全平台,全面融合网络与安全性,助力用户降低复杂性、缓解网络安全风险、减少成本,并提升性能。
蝉联领导者!Fortinet再获Gartner企业级WWLAN魔力象限认可
€460M Crypto Fraud Busted: Europol & Allies Arrest 5, Dismantle Global Money Laundering Ring
An international cryptocurrency fraud network has been dismantled in Spain, with more than 5,000 victims identified across the globe over the past several years. According to law enforcement estimates, the perpetrators managed to launder...
The post €460M Crypto Fraud Busted: Europol & Allies Arrest 5, Dismantle Global Money Laundering Ring appeared first on Penetration Testing Tools.
gogs 0.13.0 - Remote Code Execution
印度无人机军事战略对我威胁与我应对策略建议
Google Hit with $314M Verdict: Jury Rules Android Secretly Used Cellular Data for Tracking
Google has found itself at the center of a major legal battle that culminated in a California jury ordering the tech giant to pay over $314 million to Android smartphone users in the state....
The post Google Hit with $314M Verdict: Jury Rules Android Secretly Used Cellular Data for Tracking appeared first on Penetration Testing Tools.
Critical MCP Inspector Flaw (CVE-2025-49596, CVSS 9.4): Unauthenticated RCE Threatens AI Dev Machines via Browser
Anthropic has encountered a critical vulnerability in one of its AI-related projects. The flaw, identified as CVE-2025-49596, affects the Model Context Protocol (MCP) Inspector tool and has been assigned a CVSS severity score of...
The post Critical MCP Inspector Flaw (CVE-2025-49596, CVSS 9.4): Unauthenticated RCE Threatens AI Dev Machines via Browser appeared first on Penetration Testing Tools.