Aggregator
关键信息基础设施商用密码使用管理规定
Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Flaw in the Wild
Microsoft has confirmed that Chinese state-sponsored threat actors are actively exploiting critical zero-day vulnerabilities in on-premises SharePoint servers, prompting urgent security warnings for organizations worldwide. The tech giant’s Security Response Center reported coordinated attacks targeting internet-facing SharePoint installations using newly disclosed vulnerabilities that enable authentication bypass and remote code execution. Key Takeaways1. CVE-2025-53770/53771 in on-premises […]
The post Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Flaw in the Wild appeared first on Cyber Security News.
甲骨文云计算的超大客户原来是OpenAI 每年支付300亿美元使用云基础设施
Cervantes: Open-source, collaborative platform for pentesters and red teams
Cervantes is an open-source collaborative platform built for pentesters and red teams. It offers a centralized workspace to manage projects, clients, vulnerabilities, and reports, all in one place. By streamlining data organization and team coordination, it helps reduce the time and complexity involved in planning and executing penetration tests. As an open-source solution under the OWASP umbrella, it understands the specific needs of penetration testers from managing targets to organizing vulnerabilities, proof-of-concepts and remediation recommendations. … More →
The post Cervantes: Open-source, collaborative platform for pentesters and red teams appeared first on Help Net Security.
Госдума лишила мошенников любимого трюка. Новый закон превращает SIM с украденными деньгами в мёртвый номер
万物皆可人工智能!威联通(QNAP)为NAS推出外置边缘AI加速器提供3 TOPS算力
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
JVN: DuraComm製SPM-500 DP-10iN-100-MUにおける複数の脆弱性
JVN: Lantronix製Provisioning ManagerにおけるXML外部エンティティ参照(XXE)の不適切な制限の脆弱性
Phishing simulations: What works and what doesn’t
Phishing is one of the oldest and most effective technique used by cybercriminals. No one is immune to them, not even internet security experts, as seen in the case of Troy Hunt, who recently fell for a phishing email. Before AI became mainstream, phishing emails often gave themselves away. They were full of grammar mistakes and awkward wording, making them easier to spot. That’s changed. Today’s phishing attacks are much more convincing, often looking just … More →
The post Phishing simulations: What works and what doesn’t appeared first on Help Net Security.
Identity Threats Target Small Businesses in MFA Workarounds
Cybercriminals are bypassing MFA using session tokens and rogue app access, with shadow workflows enabling persistent inbox theft against SMBs. Huntress offers behavioral training and managed identity response to SMBs for real protection not just more alerts, says CEO Kyle Hanslovan.
Chinese Hackers' Evolution From Vandals to Strategists
There's a reason why many of the same tools appear time and time again in Chinese nation-state hacking: A first-generation of hackers who grew up together online and continue to swap techniques to this day. A report shows the influence of the so-called "Red 40".
Another Medical Practice Closes Its Doors After Cyberattack
Another small medical care provider has shut its doors forever as the result of a recent "devastating" cyberattack. Georgia-based Alpha Wellness & Alpha Medical Centre has permanently pulled the plug on its operations following a data theft attack by cybercriminal gang RansomHub.
US Infrastructure Remains Vulnerable 15 Years After Stuxnet
Panelists told the House subcommittee on cybersecurity and infrastructure protection that U.S. critical infrastructure sectors have made few cyber improvements over the last 15 years despite fears of retaliation following digital and physical attacks on Iranian nuclear sites.