Aggregator
DIR815栈溢出漏洞复现新手入门
Hackers Push CrystalX Malware-as-a-Service Through Telegram With Stealer and RAT Features
A new and dangerous piece of malware has surfaced and is being marketed openly to cybercriminals through private Telegram channels. Named CrystalX, this Malware-as-a-Service (MaaS) platform combines a remote access trojan (RAT), credential stealer, keylogger, clipboard hijacker, spyware, and an unusual set of prankware tools into one capable package. Discovered in March 2026, the malware […]
The post Hackers Push CrystalX Malware-as-a-Service Through Telegram With Stealer and RAT Features appeared first on Cyber Security News.
CVE-2026-24291-Windows权限提升漏洞“RegPwn”复现分析
Главное с UserGate Open Conf 2026: компания поделилась планами до 2030 года и представила концепцию архитектуры доверия
Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281)
Google has fixed 21 vulnerabilities affecting its popular Chrome browser, among them a zero-day (CVE-2026-5281) with an in-the-wild exploit. About CVE-2026-5281 As per usual, information about the fixed zero-day is limited, and there’s no details about the exploit (or how/if it’s being used by attackers). CVE-2026-5281’s official description says it’s a use-after-free (UAF) vulnerability in Dawn, an open-source and cross-platform implementation of the WebGPU standard that’s used in Chromium and Chromium-based browsers. The vulnerability affects … More →
The post Google fixes Chrome zero-day with in-the-wild exploit (CVE-2026-5281) appeared first on Help Net Security.
【安全圈】请升级:技嘉控制中心曝 9.2 分高危漏洞,黑客可远程接管电脑
【安全圈】思科开发环境遭黑客攻破,超 300 个核心代码库外泄
【安全圈】Claude Code 源代码在 NPM 包中意外泄露
10 дней до Луны. 30 минут до катастрофы. Солнечная вспышка не спрашивает разрешения
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
ImageMagick Zero-Day Enables RCE on Linux and WordPress Servers
Hackers Hijack Hotel Booking Workflows to Scam Guests With Fake Payment Requests
Travelers across the world are being targeted by a fast-growing fraud scheme that turns their own hotel reservations against them. Cybercriminals are hijacking trusted hotel booking workflows to deliver convincing fake payment requests to guests — and many victims never see it coming. The fraud starts with something as simple as a WhatsApp message. It […]
The post Hackers Hijack Hotel Booking Workflows to Scam Guests With Fake Payment Requests appeared first on Cyber Security News.
Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters
The notorious cybercriminal group ShinyHunters has allegedly claimed responsibility for three separate data breaches targeting Cisco Systems, Inc., asserting that over 3 million Salesforce records containing personally identifiable information (PII), GitHub repositories, AWS S3 buckets, and other sensitive internal corporate data have been compromised. Security researcher Dominic Alvieri detailed that on ShinyHunters’ data leak site, […]
The post Cisco Source Code and Data Leak Allegedly Claimed by ShinyHunters appeared first on Cyber Security News.
Cybersecurity Firm TAC Security Hits 10,000 Clients, Enters Top 5 in Global VM & AppSec
2026楚慧杯Web方向全解
Are We Training AI Too Late?
360安全龙虾进校园,产教融合+ADE认证赋能双在线
Anubis
You must login to view this content