Aggregator
dataease最新绕过利用json覆盖属性RCE
AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto
黑客发起供应链攻击 向周下载量达20亿次的NPM包植入恶意软件
When typing becomes tracking: Study reveals widespread silent keystroke interception
You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht University, and other institutions has found that many websites collect keystrokes as users type, sometimes before a form is ever submitted. The study explores how third-party scripts capture and share this information in ways that … More →
The post When typing becomes tracking: Study reveals widespread silent keystroke interception appeared first on Help Net Security.
京东账号安全团队招人啦!
HTTP-методы без мистики: что нужно сайту по умолчанию
Submit #635871: Ascensio System SIA OnlyOffice Community Server 12.7.0 Cross Site Scripting [Accepted]
Submit #635870: Ascensio System SIA OnlyOffice Community Server 12.7.0 Cross Site Scripting [Accepted]
Hackers Reap Minimal Gains from Massive npm Supply Chain Breach
On September 8th, 2025, at approximately 9AM EST, the npm ecosystem faced an acute supply chain attack. A threat actor leveraged social engineering techniques to compromise the account of well-known npm developer Qix, subsequently publishing malicious releases for several widely-used packages, most notably debug, chalk, and dozens of related dependencies. Within two hours of the […]
The post Hackers Reap Minimal Gains from Massive npm Supply Chain Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
进程映像伪装常见手法
Submit #642812: DaveGamble/cJSON cJSON 1.5.0/1.7.18 Memory Corruption [Duplicate]
Submit #642716: opendcim 23.04 Cross Site Scripting [Accepted]
CVE-2025-10252 | SEAT Queue Ticket Kiosk up to 20250827 Java RMI Registry deserialization
How attackers weaponize communications networks
In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations range from corporate espionage to geopolitical influence. The discussion also covers practical ways to secure networks and maintain reliable communication. Which types of communications networks are most attractive to attackers, and what are the primary motivations driving these attacks, such … More →
The post How attackers weaponize communications networks appeared first on Help Net Security.