Aggregator
China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Families
5 months ago
The China-linked advanced persistent threat (APT) group known as Aquatic Panda has been linked to a "global espionage campaign" that took place in 2022 targeting seven organizations.
These entities include governments, Catholic charities, non-governmental organizations (NGOs), and think tanks across Taiwan, Hungary, Turkey, Thailand, France, and the United States. The activity, which took place
The Hacker News
10 Critical Network Pentest Findings IT Teams Overlook
5 months ago
After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit.
Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defenses when put to the test? That’s where
The Hacker News
DMA наносит удар: техногиганты США рискуют потерять миллиарды евро
5 months ago
Apple и Google столкнулись с беспрецедентными требованиями европейских регуляторов.
360入选2024年度移动互联网APP产品安全漏洞治理优秀案例
5 months ago
360公司获评2024年度CAPPVD漏洞库“三星级技术支撑单位”(最高等级)称号
喂给AI的数据,正在反向“开盒”你的企业?
5 months ago
AI时代,谁在悄悄“开盒”你的核心竞争力?
360入选2024年度移动互联网APP产品安全漏洞治理优秀案例
5 months ago
360公司获评2024年度CAPPVD漏洞库“三星级技术支撑单位”(最高等级)称号
喂给AI的数据,正在反向“开盒”你的企业?
5 months ago
AI时代,谁在悄悄“开盒”你的核心竞争力?
CISA 将 Edimax IC-7100 IP Camera、NAKIVO 和 SAP NetWeaver AS Java 纳入已知被利用漏洞库
5 months ago
安全客
ФБР сорвало «мексиканскую рыбалку» с секретными документами Пентагона
5 months ago
Что скрывал инженер в 3400 страницах секретных документов?
Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit
5 months ago
Geofence warrants are a relatively new tool that allows law enforcement to obtain location data from devices within a specified geographic area during a specific time frame.
The post Fifth Circuit Strikes Down “Geofence” Warrants – Conflict With Fourth Circuit appeared first on Security Boulevard.
Mark Rasch
太多软件供应链防御指南看不过来?专家提炼出三大要点
5 months ago
三大初始套件:基于角色的访问控制、系统监控和边界防护
Veeam 修复Backup & Replication 中的严重RCE漏洞
5 months ago
速修复
IBM AIX 漏洞可致攻击者执行任意命令
5 months ago
安全客
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
5 months ago
Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal.
"Head Mare relied heavily on tools previously associated with Twelve. Additionally, Head Mare attacks utilized command-and-control (C2) servers exclusively linked to Twelve prior to these incidents," the company said. "This suggests
The Hacker News
2025(上海)服务机器人产业创新峰会暨长三角智能机器人生态论坛
5 months ago
4月2日下午新国际博览中心,彭鑫老师将作分享报告《神经符号融合的智能机器人系统:探索个体自主与协作规程的黄金分割点》
2025(上海)服务机器人产业创新峰会暨长三角智能机器人生态论坛
5 months ago
4月2日下午新国际博览中心,彭鑫老师将作分享报告《神经符号融合的智能机器人系统:探索个体自主与协作规程的黄金分割点》
2025(上海)服务机器人产业创新峰会暨长三角智能机器人生态论坛
5 months ago
4月2日下午新国际博览中心,彭鑫老师将作分享报告《神经符号融合的智能机器人系统:探索个体自主与协作规程的黄金分割点》
2025(上海)服务机器人产业创新峰会暨长三角智能机器人生态论坛
5 months ago
4月2日下午新国际博览中心,彭鑫老师将作分享报告《神经符号融合的智能机器人系统:探索个体自主与协作规程的黄金分割点》
2025(上海)服务机器人产业创新峰会暨长三角智能机器人生态论坛
5 months ago
4月2日下午新国际博览中心,彭鑫老师将作分享报告《神经符号融合的智能机器人系统:探索个体自主与协作规程的黄金分割点》