SecWiki News 2025-08-01 Review
面向LLM时代全尺寸现代知识图谱的精确检索基准CYPHERBENCH by ourren
筑牢Tor网络实验中统计推理的根基 by ourren
利用跨层RTT区分代理流量指纹 by ourren
传输层混淆:在TLS层规避SNI审查 by ourren
MirageFlow:一种针对 Tor 的新型带宽膨胀攻击 by ourren
更多最新文章,请访问SecWiki
Sonatype’s automated detection systems have uncovered an expansive and ongoing infiltration of the global open-source ecosystem by the notorious Lazarus Group, a threat actor believed to be backed by North Korea’s Reconnaissance General Bureau. Between January and July 2025, Sonatype identified and blocked 234 malicious software packages deployed through both the npm and PyPI open-source […]
The post Lazarus Hackers Weaponize 234 npm and PyPI Packages to Infect Developers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Aqua Security detected "Koske," a cryptomining malware that brings malicious code closer to being as good or better than malware created by humans and includes indicators that it was developed with the use of a large language model.
The post Koske Marks a Significant Step in AI-Created Malware: Aqua Security appeared first on Security Boulevard.
Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat actor linked to Chinese advanced persistent threat (APT) groups, amid widespread exploitation of Microsoft SharePoint Server vulnerabilities known as “ToolShell.” This campaign exploits four critical CVEs CVE-2025-49704, CVE-2025-49706, CVE-2025-53770, and CVE-2025-53771 to facilitate intrusions, with Storm-2603 deploying a custom command-and-control […]
The post Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.