Aggregator
CVE-2026-2373 | wproyal Royal Addons for Elementor Plugin up to 1.7.1049 on WordPress get_main_query_args authorization (EUVD-2026-12537)
New CondiBot Variant and ‘Monaco’ Cryptominer Expand Threats to Network Devices
Network infrastructure has become one of the most targeted areas in today’s threat landscape. Over recent years, attackers ranging from nation-state groups to financially driven criminal actors have steadily shifted their focus toward routers, firewalls, and other network devices. These devices sit at the core of enterprise environments, making them ideal entry points for long-term […]
The post New CondiBot Variant and ‘Monaco’ Cryptominer Expand Threats to Network Devices appeared first on Cyber Security News.
CVE-2026-4258 | sjcl sjcl.ecc.basicKey.publicKey signature verification (SNYK-JS-SJCL-15369617 / EUVD-2026-12542)
嘶吼安全动态|国家安全部预警无线键鼠存在非加密传输窃密风险 武汉新设全国唯一网络空间安全学院
嘶吼安全动态|国家安全部预警无线键鼠存在非加密传输窃密风险 武汉新设全国唯一网络空间安全学院
【嘶吼安全动态】
国家安全部预警无线键鼠存在非加密传输窃密风险
摘要:部分无线键鼠采用明文传输,可被隔空截获输入内容,威胁涉密信息与商业机密,建议优先选用AES加密设备。
原文链接:http://www.thepaper.cn/newsDetail_forward_32775807
AI安全引关注 网络安全建设待升级
摘要:AI大规模应用带来模型投毒、提示词注入等新型攻击风险,攻防失衡加剧,企业安全体系面临重构压力。
原文链接:https://www.stcn.com/article/detail/3680299.html
互联网工程组织大会聚焦AI与网络安全
摘要:大会围绕AI与网络融合、网络安全、协议演进等议题展开,强调未来互联网安全挑战。
原文链接:http://cpc.people.com.cn/n1/2026/0316/c64387-40682594.html
AI智能体安全使用指南发布
摘要:建议采用最小权限、数据加密及隔离运行,防范AI代理被利用执行恶意操作。
原文链接:https://www.chinanews.com.cn/sh/2026/03-17/10587890.shtml?utm_source=chatgpt.com
武汉新设全国唯一网络空间安全学院,秋季启动招生
摘要:教育部批复同意设置,为全国唯一独立网安类本科高校,选址武汉网安基地,2026 秋首批招生,设 4 个核心专业。
原文链接:http://m.toutiao.com/group/7617717265865179698/
奇安信发布《OpenClaw 生态威胁分析报告》
摘要:全球OpenClaw(龙虾)部署超23万实例,近9%存漏洞;中美部署占比超65%,仿冒域名超3500个。
原文链接:http://m.toutiao.com/group/7617787474126881314/
新加坡电信网络故障排除网络攻击因素
摘要:大规模通信中断引发网络攻击猜测,但官方称暂无证据表明为网络安全事件。
原文链接:https://www.zaobao.com.sg/news/singapore/story20260316-8742408
Microsoft产品存在信息泄露漏洞
摘要:多个Microsoft应用被发现漏洞,攻击者可远程窃取敏感数据并篡改系统内容。
原文链接:https://www.hkcert.org/tc/security-bulletin/microsoft-products-information-disclosure-vulnerability_20260316
伊朗发动对美最大规模网络攻击,致医疗巨头瘫痪
摘要:《华尔街日报》报道,伊朗黑客组织攻击美国医疗公司史赛克,瘫痪其在线系统,报复美对伊军事打击。
原文链接:https://m.weibo.cn/detail/5277218634731000
黑客利用Unicode隐藏恶意代码攻击GitHub
摘要:GlassWorm攻击中,攻击者用不可见Unicode编码恶意代码,感染151个GitHub库,窃取开发者密钥。
原文链接:http://m.toutiao.com/group/7618014737044996608/
朝鲜背景黑客组织发起鱼叉攻击引韩方警惕
Больше не напишут «займи до зарплаты». Полиция разогнала тех, кто взламывал ваши профили
嘶吼安全动态|国家安全部预警无线键鼠存在非加密传输窃密风险 武汉新设全国唯一网络空间安全学院
长亭「捕虾」工具开源首发!企业级 OpenClaw 风险监控实战指南
嘶吼安全动态|国家安全部预警无线键鼠存在非加密传输窃密风险 武汉新设全国唯一网络空间安全学院
长亭「捕虾」工具开源首发!企业级 OpenClaw 风险监控实战指南
Hidden instructions in README files can make AI agents leak data
Developers rely on AI coding agents to set up projects, install dependencies, and run commands by following instructions in repository README files, which provide setup guidance for software projects. New research identifies a security risk when attackers hide malicious instructions in those documents. A semantic injection attack, where injections are embedded in an installation file, leading to the unintended leakage of sensitive local files. Tests showed that hidden instructions in README files could trigger AI … More →
The post Hidden instructions in README files can make AI agents leak data appeared first on Help Net Security.
CVE-2026-3864
幼儿面对屏幕时间过长 更可能出现自闭症相关症状
$54.000 за одно видео. В ОАЭ судят туриста, который снял немного не то и не так
What to do in the first 24 hours of a breach
In this Help Net Security video, Arvind Parthasarathi, CEO of CYGNVS, walks through a 10-step process for handling a cybersecurity breach. The first five steps cover preparation: setting up an out-of-band communication platform, identifying internal stakeholders, selecting external providers like legal counsel and forensic firms, building cross-functional playbooks, and running tabletop exercises to test those playbooks. The second five steps address what to do once a breach is underway. These include setting up real-time dashboards, … More →
The post What to do in the first 24 hours of a breach appeared first on Help Net Security.