Aggregator
CISA Releases Six Industrial Control Systems Advisories
5 months ago
CISA released six Industrial Control Systems (ICS) advisories on July 15, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-196-01 Hitachi Energy Asset Suite
- ICSA-25-196-02 ABB RMC-100
- ICSA-25-196-03 LITEON IC48A and IC80A EV Chargers
- ICSA-25-037-02 Schneider Electric EcoStruxure (Update B)
- ICSA-25-140-08 Schneider Electric Modicon Controllers (Update A)
- ICSA-25-070-01 Schneider Electric Uni-Telway Driver (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA
Last Week in Security (LWiS) - 2025-07-14
5 months ago
文章概述了过去一周的网络安全动态,包括Havoc Pro专业版发布、Meta支付或同意模式争议、英国逮捕散网勒索集团成员以及LudusHound网络重建工具等技术亮点。此外还涉及跨会话激活攻击、FortiWeb RCE漏洞利用及隐私泄露事件如瑞典首相地址被Strava数据曝光等。
4 компании, $800 млн и одна цель — научить ИИ убивать. Спокойной ночи, человечество
5 months ago
OpenAI, Google и армия США — теперь в одной команде. Что может пойти не так?
【安全圈】500美元就能遥控列车急刹?美国铁路12年前的惊天漏洞,如今才被曝光!
5 months ago
关键词漏洞最近,一则关于北美铁路系统的重大安全漏洞震惊网络安全圈。
【安全圈】起亚车机系统曝安全漏洞!黑客竟能远程操控
5 months ago
关键词🔒 一、Coinbase数据泄露余波事件升级泄露规模:确认69,461名用户敏感信息被盗,含住址、证件
【安全圈】万余条公民个人数据被非法获取出售,房产局工作人员涉案!
5 months ago
OpenAI's ChatGPT-powered browser is codenamed 'Aura'
5 months ago
OpenAI is following Perplexity and is working on its own AI-powered browser codenamed "Aura." [...]
Mayank Parmar
North Korean Actors Expand Contagious Interview Campaign with New Malware Loader
5 months ago
Socket has identified a new malware loader called XORIndex incorporated into malicious packages published to the npm registry, with over 9000 downloads so far
Meme Coins in 2025: High Risk, High Reward, and Rising Security Threats
5 months ago
Meme coins started as internet jokes, but by 2025, they’ve become one of the most volatile and talked-about…
Owais Sultan
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
5 months ago
Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon.
The activity is being tracked by Palo Alto Networks Unit 42 under the moniker CL-STA-1020, where "CL" stands for "cluster" and "STA" refers to "state-backed motivation."
"The threat actors behind this
The Hacker News
中国车载芯片走向世界
5 months ago
高档车型使用的车载芯片通常来自英伟达和高通,但在普通车型使用性价比更高的中国半导体厂商日益受到青睐。截至 2024 年 9月 底,成立于 2015 年的地平线机器人公司的 SoC 已经获得 27 家汽车厂商的 285 款车型采用。地平线的下一个目标是走向世界。其战略是与欧洲的大型供应商联手,将自己的 SoC 销往世界市场。它的合作伙伴包括了德国博世(Bosch)和德国大陆集团(Continental)。另一家公司芯驰科技的 SoC 被本田和日产汽车的中国合资公司在其车型中采用。德国大众(VW)集团在巴西和印度等地销售的新车型采用了吉利控股集团旗下的芯擎科技开发的座舱用 SoC“龙鹰一号”。地缘政治风险是中国车载芯片厂商全球化计划面临的巨大挑战,至少美国汽车厂商不太可能会使用中国的 SoC。
France Nabs Russian Basketball Player in Ransomware Probe
5 months ago
US Authorities Say Daniil Kasatkin, 26, Worked as Negotiator for Ransomware Group
A Paris criminal court on Tuesday held an extradition hearing for a Russian professional basketball player who U.S. authorities say worked as a negotiator for an undisclosed ransomware group. French police on June 21 arrested Daniil Kasatkin, 26, at Charles de Gaulle Airport.
A Paris criminal court on Tuesday held an extradition hearing for a Russian professional basketball player who U.S. authorities say worked as a negotiator for an undisclosed ransomware group. French police on June 21 arrested Daniil Kasatkin, 26, at Charles de Gaulle Airport.
How Trump's Cyber Cuts Dismantle Federal Information Sharing
5 months ago
Experts Warn Federal Cyber Cuts Are Hindering Public-Private Threat Sharing Efforts
The White House has continued to sharply reduce the size of cybersecurity teams across the federal government while cutting information technology budgets and funding for key programs. Experts warn public-private information sharing around critical cyberthreats has slowed.
The White House has continued to sharply reduce the size of cybersecurity teams across the federal government while cutting information technology budgets and funding for key programs. Experts warn public-private information sharing around critical cyberthreats has slowed.
Aviatrix Pivots Investment From Networking to Cloud Security
5 months ago
CEO Doug Merritt: GenAI, Workload Sprawl Raise Zero Trust Stakes for Aviatrix
Aviatrix is addressing cloud network security gaps with its new Cloud Native Security Fabric. CEO Doug Merritt says companies need zero trust across ephemeral workloads, especially with agentic AI multiplying data pathways. The company’s pivot includes a new C-suite and product strategy overhaul.
Aviatrix is addressing cloud network security gaps with its new Cloud Native Security Fabric. CEO Doug Merritt says companies need zero trust across ephemeral workloads, especially with agentic AI multiplying data pathways. The company’s pivot includes a new C-suite and product strategy overhaul.
Wing FTP Vulnerability Actively Exploited Globally
5 months ago
Remote Code Execution Flaw Affects More Than 5,000 Servers
Threat actors are actively exploiting a critical vulnerability in a server file transfer solution. Researchers say the flaw in Wing FTP Server could allow threat actors to execute system-level commands remotely, using null byte and Lua injection without authentication.
Threat actors are actively exploiting a critical vulnerability in a server file transfer solution. Researchers say the flaw in Wing FTP Server could allow threat actors to execute system-level commands remotely, using null byte and Lua injection without authentication.
Securing Agentic AI: How to Protect the Invisible Identity Access
5 months ago
AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can’t easily see. These “invisible” non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have
The Hacker News
AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe
5 months ago
Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in January 2019 and has since served as the foundation for several other variants.
"AsyncRAT has cemented its place as a cornerstone of modern malware and as a pervasive threat that has evolved into a sprawling network of forks and variants," ESET
The Hacker News
Scattered Spider攻击剖析:不断演变的勒索软件威胁
5 months ago
黑客组织借社工突破服务台,滥用特权账户实施云-本地混合打击,防御需兼顾人技双维度。
美国会要求评估未来网军部署概念并制订新网络威慑战略
5 months ago
美参议院2026财年国防授权法案草案“网络安全”条款