Aggregator
WinRAR之CVE-2025-6218漏洞复现与分析
苹果 CarPlay 远程攻击可干扰汽车司机并实施监控
Cursor AI 编辑器可导致仓库在设备上“自动运行”恶意代码
Nano11: Windows похудела до скелета — 2,8 ГБ на диске, и ни одного лишнего байта
苹果警告:多起雇佣间谍软件攻击瞄准用户设备
2025大厂技术岗实时更新!企业新增职位汇总
Apatch内核模块之svc监控和栈回溯
智能时代·可信安全 | 弦盾科技,助力第九届安全开发者峰会(SDC2025)
每周蓝军技术推送(2025.9.6-9.12)
Buterat Backdoor Campaigns Targeting Enterprise Endpoint Control
Backdoor malware is a covert type of malicious software designed to bypass standard authentication mechanisms and provide persistent, unauthorized access to compromised systems. Unlike conventional malware that prioritizes immediate damage or data theft, backdoors focus on stealth and longevity, enabling attackers to control infected endpoints remotely, deploy additional payloads, exfiltrate sensitive information, and move laterally […]
The post Buterat Backdoor Campaigns Targeting Enterprise Endpoint Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Malware Using Azure Functions For Hosting Command And Control Infrastructure
A new, sophisticated malware campaign has been uncovered that leverages Microsoft’s Azure Functions for its command-and-control (C2) infrastructure, a novel technique that complicates detection and takedown efforts. According to the Dmpdump report, the malware, first identified from a file uploaded to VirusTotal on August 28, 2025, from Malaysia, employs a multi-stage infection process involving DLL […]
The post New Malware Using Azure Functions For Hosting Command And Control Infrastructure appeared first on Cyber Security News.
Samsung patches actively exploited zero-day reported by WhatsApp
CVE-2025-39737 | Linux Kernel up to 6.17-rc1 mm __kmemleak_do_cleanup iteration (WID-SEC-2025-2040)
WorldLeaks
You must login to view this content
奇安信集团2025年09月补丁库更新通告-第一次更新
Проверьте свой iPhone: утекшие файлы Apple доказали, что политика сильнее кода
《不要因为走得太远而忘记为什么出发》
算书评?