Aggregator
竟长达10年未发现?Ubuntu系统“needrestart”工具曝5个本地提权漏洞
Hack.lu 2024 Getting into Shape 解析
惊喜开班!系统0day安全-IOT设备漏洞挖掘
「半价理想」,为何成为今年增长最快的车企?
CVE-2024-11596 | Wireshark up to 4.2.8/4.4.1 ECMP Dissector buffer over-read
CVE-2024-11595 | Wireshark up to 4.2.8/4.4.1 FiveCo RAP Dissector infinite loop
CVE-2024-10792 | getwpfunnels Easiest Funnel Builder for WordPress & WooCommerce Plugin cross site scripting
新书发布会 |《先进云安全研究与实践》限时5折
案例征集 | 工业行业重发展轻安全 企业需要怎样的安全保障?
HiddenLayer Automated Red Teaming prevents malicious manipulation of AI models
HiddenLayer launched Automated Red Teaming solution for artificial intelligence, a transformative tool that enables security teams to rapidly and thoroughly assess generative AI system vulnerabilities. The addition of this new product extends HiddenLayer’s AISec platform capabilities to include Automated Red Teaming, Model Scanning, and GenAI Detection & Response – all under one platform. This innovative solution provides fast, reliable protection for AI deployments, helping businesses safeguard sensitive data and intellectual property, and prevent malicious manipulation … More →
The post HiddenLayer Automated Red Teaming prevents malicious manipulation of AI models appeared first on Help Net Security.
N-able Strengthens Cybersecurity via $266M Adlumin Purchase
With Adlumin’s cloud-native XDR and MDR services, N-able consolidates its position as a leader in IT management. Buying the Washington D.C.-based security operations vendor for up to $266 million drives value through AI-powered threat detection and compliance solutions tailored for MSPs.
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
Explore MITRE ATT&CK Techniques in Real-World Samples with TI Lookup
We’re excited to announce the latest update to Threat Intelligence (TI) Lookup. The enhanced home screen now integrates all techniques and tactics of the MITRE ATT&CK matrix, along with relevant malware samples and signatures. Let’s dive into how these updates can transform your workflow and help you tackle threats with greater confidence. Redesigned Threat Intelligence […]
The post Explore MITRE ATT&CK Techniques in Real-World Samples with TI Lookup appeared first on ANY.RUN's Cybersecurity Blog.
Researchers unearth two previously unknown Linux backdoors
ESET researchers have identified multiple samples of two previously unknown Linux backdoors: WolfsBane and FireWood. The goal of the backdoors and tools discovered is cyberespionage that targets sensitive data such as system information, user credentials, and specific files and directories. These tools are designed to maintain persistent access and execute commands stealthily, enabling prolonged intelligence gathering while evading detection. WolfsBane execution chain (Source: ESET) WolfsBane Researchers discovered the WolfsBane samples at VirusTotal, uploaded from Taiwan, … More →
The post Researchers unearth two previously unknown Linux backdoors appeared first on Help Net Security.
Кальмары против уколов: инженеры создали чудо-капсулу, которая заменит иглы
Меньше рисков, больше контроля: Windows 11 поднимает планку безопасности
Z-Library 帮助学生克服贫困
Lenovo introduces ThinkShield Firmware Assurance
Lenovo introduced ThinkShield Firmware Assurance as part of its portfolio of enterprise-grade cybersecurity solutions. ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operating system (OS) by embracing Zero Trust Architecture (ZTA) component-level visibility to generate more accurate and actionable risk management insights. As a security paradigm, ZTA explicitly identifies users and devices to grant appropriate levels of access so a business can operate with … More →
The post Lenovo introduces ThinkShield Firmware Assurance appeared first on Help Net Security.
5 Hackers Charged for Attacking Companies via Phishing Text Messages
Federal authorities have unsealed charges against five individuals accused of orchestrating sophisticated phishing schemes that targeted employees of companies across the United States. The alleged hackers reportedly stole confidential company data and millions of dollars in cryptocurrency by exploiting stolen employee credentials. The defendants, ranging in age from 20 to 25, are accused of conspiracy […]
The post 5 Hackers Charged for Attacking Companies via Phishing Text Messages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.