Aggregator
CVE-2025-12604 | itsourcecode Online Loan Management System 1.0 /load_fields.php loan_id sql injection (EUVD-2025-37446)
Europe’s phone networks are drowning in fake calls
Caller ID spoofing has become one of Europe’s most persistent enablers of cyber fraud. A new position paper from Europol warns that manipulated phone identities now drive much of the continent’s financial and social engineering crime, making it difficult for law enforcement to track perpetrators. The agency estimates global losses at around EUR 850 million a year, with phone and text-based fraud accounting for roughly two thirds of reported scam cases. A network flooded with … More →
The post Europe’s phone networks are drowning in fake calls appeared first on Help Net Security.
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy
In this episode, we explore OpenAI’s groundbreaking release GPT Atlas, the AI-powered browser that remembers your activities and acts on your behalf. Discover its features, implications for enterprise security, and the risks it poses to privacy. Join hosts Tom Eston and Scott Wright as they discuss everything from the browser’s memory function to vulnerabilities like […]
The post OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy appeared first on Shared Security Podcast.
The post OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy appeared first on Security Boulevard.
Proton Warns of 300 Million Stolen Login Details Circulating on Dark Web
Privacy-focused technology company Proton has issued a warning about the escalating data breach crisis, revealing that hundreds of millions of stolen login credentials are actively circulating on the dark web. Through its Data Breach Observatory initiative, Proton is directly monitoring underground cybercriminal forums to identify and report data leaks in real time, helping businesses protect […]
The post Proton Warns of 300 Million Stolen Login Details Circulating on Dark Web appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Install YTPTube on Ubuntu Linux
2025年10月29日美韩首脑会谈对我影响分析
美日稀土供应链协议对我影响及应对策略分析
从开源情报到人力情报,按难度对情报学科进行排名
Call Center AI – 微软竟然开源了整套、能打电话的 AI 呼叫中心
西交利物浦大学 | HoneyLLM:基于大语言模型的中交互蜜罐系统
CVE-2025-12605 | itsourcecode Online Loan Management System 1.0 /manage_loan.php ID sql injection (EUVD-2025-37451)
CVE-2025-12606 | itsourcecode Online Loan Management System 1.0 /manage_borrower.php ID sql injection (EUVD-2025-37450)
DeepSeek против Nvidia, Шанхай против Силиконовой долины. Си Цзиньпин объявил о плане контроля над мировым ИИ
Frogy: The New Recon Tool That Maps and Prioritizes Your Entire Attack Surface
Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit designed to map out an organization’s
The post Frogy: The New Recon Tool That Maps and Prioritizes Your Entire Attack Surface appeared first on Penetration Testing Tools.
Gartner分析师谈AI Agent和Agentic AI
勒索软件受害者付款率创历史新低 仅23%受攻击企业妥协
勒索软件受害者付款率创历史新低 仅23%受攻击企业妥协
据统计,遭勒索软件威胁的受害者付款比例降至历史新低,仅有23%的遭入侵企业屈服于攻击者的勒索要求。除个别情况外,这一付款比例的下降延续了Coveware公司过去六年观察到的趋势。
2024年第一季度,付款比例为28%;尽管后续一段时间有所回升,但整体持续下滑,最终在2025年第三季度触及历史最低点。
一、付款率下降的核心原因
1. 企业针对勒索软件实施了更强大、更具针对性的防护措施。
2. 有关部门持续向受害者施压,呼吁其不要向黑客支付赎金。
Coveware表示:“网络防御人员、执法机构和法律专家应将这一现象视为集体努力取得成效的证明。”为预防攻击、降低攻击影响、成功应对网络勒索所做的每一份努力——每一笔避免支付的赎金,都在切断网络攻击者的生存空间。
2019-2022年内赎金支付的百分比
二、勒索软件攻击的关键趋势演变
1. 攻击模式:从单纯加密转向“双重勒索”
多年来,勒索软件团伙已从单纯的加密攻击,转向伴随数据窃取与公开泄露威胁的“双重勒索”模式。报告显示,2025年第三季度其监测到的攻击中,超76%涉及数据窃取——这已成为大多数勒索软件团伙的首要目标。
该报告指出,若仅统计不加密数据、仅窃取信息的攻击案例,付款率会骤降至19%,这也是该细分类型的历史最低记录。
2. 赎金金额:平均与中位数付款额双双下降
2025年第三季度的初始访问向量
据Coveware数据,2025年第三季度的平均赎金与中位数赎金较上一季度均有所下降,分别降至37.7万美元和14万美元。这一变化可能反映出大型企业正在修订赎金支付政策,意识到将资金用于加强防御、防范未来攻击更为合理。
3. 攻击目标:聚焦中型企业,大型企业仍存风险
研究人员还发现,2025年第三季度占所有记录攻击44%的Akira和Qilin等威胁团伙,已将重心转向中型企业——这类企业目前更有可能支付赎金。
利润下滑正促使勒索软件团伙采取更精准的攻击策略;随着利润率持续收缩,大型企业仍可能成为日益重要的攻击目标。
4. 攻击向量:远程访问与软件漏洞滥用加剧
过去一年另一显著趋势是,远程访问入侵已成为主要攻击向量,同时软件漏洞的滥用也大幅增加。
随着大型组织安全防护能力的提升,威胁者可能会更多依赖社会工程学攻击和招募内部人员,通过高额贿赂获取初始访问权限。