Aggregator
当贝AI官网DeepSeek满血版:全网AI大模型聚合(通义千问/豆包AI)免费不限量
网络安全信息与动态周报2025年第7期(2月10日-2月16日)
网络安全信息与动态周报2025年第7期(2月10日-2月16日)
网络安全信息与动态周报2025年第7期(2月10日-2月16日)
网络安全信息与动态周报2025年第7期(2月10日-2月16日)
网络安全信息与动态周报2025年第7期(2月10日-2月16日)
警惕!假冒CS2赛事直播瞄准玩家钱包,加密货币和Steam账户被盗风险激增
Talos: No Cisco Zero Days Used in Salt Typhon Telecom Hacks
Chinese hackers who infiltrated U.S. telecoms likely only used one, known Cisco vulnerability, says Cisco's threat analysis unit. Otherwise, the Chinese nation-state cyberespionage operation known as Salt Typhoon used stolen login credentials living-off-the-land techniques, says Cisco Talos.
Google Integrates Quantum-Safe Digital Signatures
Google adopted quantum-safe digital signatures for its cloud environment designed to help users combat the next phase of adversarial attacks. The announcement from the company comes days after Microsoft unveiled its latest quantum chip. NIST formalized the algorithms in August 2024.
Change Healthcare's Mega Attack: 1 Year Later
It's been one year since hackers attacked IT services provider Change Healthcare, quickly shutting down critical processes for thousands of healthcare entities, triggering a data breach affecting 190 million people. So what top lessons are emerging from that massive disruption and data compromise?
MDR, EDR Markets See Wave of M&A as Competition Intensifies
Rising competition from CrowdStrike and Microsoft is driving MDR and EDR providers to consolidate. Companies such as Sophos and Arctic Wolf are acquiring endpoint or managed security technology to enhance detection and response capabilities, signaling a shift toward full-stack security solutions.
BugChecker: kernel and user debugger for Windows 11
BugChecker BugChecker is a SoftICE-like kernel and user debugger for Windows 11 (and Windows XP as well: it supports Windows versions from XP to 11, both x86 and x64). BugChecker doesn’t require a second machine...
The post BugChecker: kernel and user debugger for Windows 11 appeared first on Penetration Testing Tools.
r4ven: Track the IP address and GPS location of the user’s smartphone or PC and capture a picture of the target
r4ven The tool hosts a fake website that uses an iframe to display a legit website and, if the target allows it, it will fetch the Gps location (latitude and longitude) of the target,...
The post r4ven: Track the IP address and GPS location of the user’s smartphone or PC and capture a picture of the target appeared first on Penetration Testing Tools.
CVE-2025-23209 | Craft CMS up to 4.13.7/5.5.4 code injection (GHSA-x684-96hh-833x)
RemoteTLSCallbackInjection: execute a payload without spawning any threads in a remote process
Maldev Academy – RemoteTLSCallbackInjection This method utilizes TLS callbacks to execute a payload without spawning any threads in a remote process. This method is inspired by Threadless Injection as RemoteTLSCallbackInjection does not invoke any API calls...
The post RemoteTLSCallbackInjection: execute a payload without spawning any threads in a remote process appeared first on Penetration Testing Tools.
苹果 AI 确认 4 月支持中文;小米 YU7 首次全面曝光;TikTok 美国重新上架,下载暴涨 | 极客早知道
Talos: No Cisco Zero Days Used in Salt Typhon Telecom Hacks
Chinese hackers who infiltrated U.S. telecoms likely only used one, known Cisco vulnerability, says Cisco's threat analysis unit. Otherwise, the Chinese nation-state cyberespionage operation known as Salt Typhoon used stolen login credentials living-off-the-land techniques, says Cisco Talos.
Google Integrates Quantum-Safe Digital Signatures
Google adopted quantum-safe digital signatures for its cloud environment designed to help users combat the next phase of adversarial attacks. The announcement from the company comes days after Microsoft unveiled its latest quantum chip. NIST formalized the algorithms in August 2024.
Change Healthcare's Mega Attack: 1 Year Later
It's been one year since hackers attacked IT services provider Change Healthcare, quickly shutting down critical processes for thousands of healthcare entities, triggering a data breach affecting 190 million people. So what top lessons are emerging from that massive disruption and data compromise?