Aggregator
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
T00ls第十二届年度(2024)人物风云榜
[Meachines] [Easy] Horizontall Strapi RCE+KTOR-HTTP扫描+Laravel Monolog 权限提升
BianLian
Russian Hackers Target Signal Messenger Users to Steal Sensitive Data
Russian state-aligned threat actors have intensified their efforts to compromise Signal Messenger accounts, targeting individuals of strategic interest, according to the Google Threat Intelligence Group (GTIG). These campaigns, primarily linked to Russia’s ongoing military operations in Ukraine, aim to intercept sensitive communications from military personnel, politicians, journalists, and activists. The attackers are exploiting Signal’s “linked […]
The post Russian Hackers Target Signal Messenger Users to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Akira
Hackers Exploit Jarsigner Tool to Deploy XLoader Malware
Security researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a new campaign leveraging the legitimate JAR signing tool, jarsigner.exe, to distribute the XLoader malware. The attack employs a DLL side-loading technique, where malicious DLL files are placed alongside legitimate executable files to ensure their execution when the legitimate application is run. This method exploits […]
The post Hackers Exploit Jarsigner Tool to Deploy XLoader Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Converting Stolen Payment Card Data into Apple & Google Wallets
Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts. This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States. […]
The post Hackers Converting Stolen Payment Card Data into Apple & Google Wallets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
iOS 18 settings to lock down your privacy and security
Enhancing your security and privacy on iOS 18 involves configuring various settings to control access to your personal data and device features. Here are 12 essential settings to consider. Enable two-factor authentication (2FA) Using 2FA authentication adds an extra layer of security to your Apple ID. When it’s on, the account password and the six-digit verification code are required to access the account. The verification code is sent to the phone number associated with the … More →
The post iOS 18 settings to lock down your privacy and security appeared first on Help Net Security.
DEF CON 32 – MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics
Authors/Presenters: G. Horvath, W.. Tam
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics appeared first on Security Boulevard.
Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign
A new variant of the Snake Keylogger, also known as 404 Keylogger, has been detected targeting users of popular web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox. FortiGuard Labs identified this threat using FortiSandbox v5.0 (FSAv5), a cutting-edge malware detection platform powered by advanced artificial intelligence (AI) and machine learning. This malicious […]
The post Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware
The SonicWall Capture Labs threat research team has identified continued activity from the Russian cybercriminal group CryptoBytes, which has been active since at least 2023. This financially motivated group is leveraging a ransomware strain named UxCryptor, which has gained notoriety for its reliance on leaked ransomware builders. These tools lower the technical barrier for malware […]
The post Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SecWiki News 2025-02-19 Review
如何为大型语言模型植入后门:“BadSeek”开源编码模型 by ourren
FiniteMonkey引擎的总结与思考(记录用) by ourren
本地化 AI 审计工具落地小试牛刀 by ourren
更多最新文章,请访问SecWiki