Aggregator
G.O.S.S.I.P 阅读推荐 2025-09-15 CVE:学术界的"水论文神器"还是真正的安全指标?
Submit #648516: github.com Course Selection System V1.0 SQL Injection [Accepted]
Hackers Using Generative AI ‘ChatGPT’ to Evade Anti-virus Defenses
In mid-July 2025, a novel campaign emerged in which cybercriminals weaponized generative AI to fabricate deepfake images of government IDs, embedding them within spear-phishing messages that bypassed traditional antivirus safeguards. These emails impersonated military and security institutions, complete with convincing visual assets generated by ChatGPT. Recipients were urged to review “draft” ID cards, triggering the […]
The post Hackers Using Generative AI ‘ChatGPT’ to Evade Anti-virus Defenses appeared first on Cyber Security News.
Submit #648484: SpyShelter <=15.4.0.1012 Local Privilege Escalation [Accepted]
Microsoft fixes Windows 11 audio issues confirmed in December
CVE-2025-39799 | Linux Kernel up to 6.17-rc1 ACPI denial of service (WID-SEC-2025-2051)
CVE-2025-39798 | Linux Kernel up to 6.16.1 NFS privilege escalation (Nessus ID 264707 / WID-SEC-2025-2051)
CVE-2025-39794 | Linux Kernel up to 6.16.1 ARM denial of service (Nessus ID 264712 / WID-SEC-2025-2051)
CVE-2025-39795 | Linux Kernel up to 6.16.1 block blk_stack_limits buffer overflow (Nessus ID 264709 / WID-SEC-2025-2051)
CVE-2025-39792 | Linux Kernel up to 6.12.42/6.15.10/6.16.1 dm_accept_partial_bio deadlock (WID-SEC-2025-2051)
CVE-2025-43794 | Liferay Portal/DXP cross site scripting (WID-SEC-2025-2052)
Checkmarx Surfaces Lies-in-the-Middle Attack to Compromise AI Tools
Checkmarx today published a technique it has uncovered that poisons artificial intelligence (AI) agents models in a way that convinces them to tell end users that certain activities and behaviors are safe when in fact they are high risk. Darren Meyer, security research advocate at Checkmarx Zero, a research arm of the company, said this..
The post Checkmarx Surfaces Lies-in-the-Middle Attack to Compromise AI Tools appeared first on Security Boulevard.
CVE-2025-47188 | Mitel 6800/6900/6900w/6970 up to 6.4 SP4 command injection
【2026合作伙伴巡礼】骁骐科技——守护数据价值与安全
Sidewinder Hackers Weaponize Nepal Protests to Spread Cross-Platform Malware
Sidewinder, a well-known advanced persistent threat (APT) group, has adapted its tactics to exploit the ongoing protests in Nepal, deploying a coordinated campaign of mobile and Windows malware alongside credential phishing. By masquerading as respected national institutions and figures, the group seeks to harvest sensitive data from users tracking the nation’s political turmoil. The protests, […]
The post Sidewinder Hackers Weaponize Nepal Protests to Spread Cross-Platform Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
温州大学 | MPAF:基于多阶段属性指纹的加密流量分类
Ваш антивирус бесполезен. Полный контроль над Mac, Windows и Linux — теперь это цель нового вируса
When ‘minimal impact’ isn’t reassuring: lessons from the largest npm supply chain compromise
Commentary that downplays the compromise’s impact misses the point, the co-founder of Sonatype argues.
The post When ‘minimal impact’ isn’t reassuring: lessons from the largest npm supply chain compromise appeared first on CyberScoop.
BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies
The BlackNevas ransomware group has emerged as a significant threat since November 2024, continuously launching devastating attacks against businesses and critical infrastructure organizations across Asia, North America, and Europe. This sophisticated malware operation combines file encryption with data theft tactics, threatening to leak stolen information if ransom demands are not met within seven days. The […]
The post BlackNevas Ransomware Encrypts Files and Steals Sensitive Data From Affected Companies appeared first on Cyber Security News.