Aggregator
AWDP中uaf的patch研究
— «Ты зашифровал файлы?» — «Да» — «А где ключ?» — «В папке Temp» — «Упс…». Вот почему вымогатель Pay2Key не так страшен, как его рисуют
CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access and Steal Secrets
A financially motivated cybercrime group has been quietly compromising cloud environments since late 2025, and its activities are now drawing serious concern across the security community. The group, known as TeamPCP, operates a self-propagating worm called CanisterWorm that hunts for poorly secured Docker APIs, Kubernetes clusters, Redis servers, and systems vulnerable to the React2Shell flaw. […]
The post CanisterWorm Malware Attacking Docker/K8s/Redis to Gain Access and Steal Secrets appeared first on Cyber Security News.
阿里CTF Java赛道Fury反序列化漏洞分析与利用链挖掘
Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643)
A critical SQL injection vulnerability (CVE-2026-21643) in Fortinet FortiClient Endpoint Management Server (EMS), a management server for FortiClient endpoint agents on various platforms, is under active exploitation. The warning comes from Defused Cyber, which helps organizations deploy honeypots/fake assets, and uses them as well to capture real attack attempts and exploits and provide early warning threat intelligence. “Currently marked as not exploited on CISA and other Known Exploited Vulnerabilities (KEV) lists, [CVE-2026-21643] has seen first … More →
The post Critical Fortinet FortiClient EMS bug under active attack (CVE-2026-21643) appeared first on Help Net Security.
Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
微软 Copilot 在修改 PR 中的拼写错误时添加了广告
State Department reissues $10 million reward for info on Iranian hackers
CISCN&长城杯 2026分区赛区AWDP-Web
Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files
A high-severity security flaw has been discovered in Vim, one of the most widely used text editors among developers. This vulnerability allows attackers to execute arbitrary operating system commands simply by tricking a user into opening a specially crafted file. Discovered by security researcher Hung Nguyen, the bug chain highlights the persistent risks associated with how […]
The post Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files appeared first on Cyber Security News.
木星闪电释放的能量相当于原子弹爆炸
【工具】EditHttpMsg For Burp UI Demo
7 tabletop exercise scenarios every cybersecurity team should practice in 2026
Overview As cybersecurity threats continue to evolve and become more sophisticated, the need for comprehensive preparedness has never been more critical. Tabletop exercises are essential for testing and refining incident response plans, enhancing coordination between departments, and staying ahead of malicious actors. In this article, we outline seven tabletop exercise scenarios that cybersecurity teams should […]
The post 7 tabletop exercise scenarios every cybersecurity team should practice in 2026 first appeared on TrustCloud.
The post 7 tabletop exercise scenarios every cybersecurity team should practice in 2026 appeared first on Security Boulevard.
В Китай теперь со своим нельзя. Евродепутаты перешли на кнопочные одноразовые телефоны
NIST Researchers Develop Photonic Chip Packaging That Can Withstand Extreme Environments
DeepLoad Malware Combines ClickFix With AI-Generated Code to Avoid Detection
Vulnerability affecting F5 BIG-IP APM
Why cyber defenders need to be ready for frontier AI
CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First
Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he studied the convergence of educational technology with computer science as part of his psychology MA – finding, to his disbelief, that systems were perilously insecure. Since then, he’s always worked in and around cybersecurity. He’s had roles as a computer [...]
The post CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First appeared first on Wallarm.
The post CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First appeared first on Security Boulevard.