Aggregator
Ubunntu 高危漏洞可导致攻击者获得根权限
CVE-2026-25438 | ThemeHunk Gutenberg Blocks Plugin up to 1.2.8 on WordPress cross site scripting (EUVD-2026-13077)
CVE-2026-25443 | Dotstore Fraud Prevention for Woocommerce Plugin up to 2.3.3 on WordPress authorization (EUVD-2026-13081)
CVE-2026-25445 | Membership WishList Member X Plugin up to 3.29.0 on WordPress deserialization (EUVD-2026-13083)
CVE-2026-25442 | QantumThemes Kentha Plugin up to 4.7.2 on WordPress cross site scripting (EUVD-2026-13079)
CVE-2026-27065 | ThimPress BuilderPress Plugin up to 2.0.1 on WordPress filename control (EUVD-2026-13085)
900,000 contact records exposed in Aura data breach
Aura, the online safety service, confirmed that an unauthorized party accessed about 900,000 records, mostly names and email addresses from a marketing tool linked to a company it acquired in 2021. The incident occurred as a result of a targeted phone phishing attack that tricked one of the employees. Aura believes that contact information related to less than 20,000 active customers and less than 15,000 former customers was accessed. According to Have I Been Pwned, … More →
The post 900,000 contact records exposed in Aura data breach appeared first on Help Net Security.
居家办公有助于提高生育率
Critical Microsoft SharePoint flaw now exploited in attacks
New ‘Perseus’ Android malware checks user notes for secrets
New ‘Perseus’ Android malware checks user notes for secrets
对《互联网应用程序个人信息收集使用规定(征求意见稿)》的学习浅析
Critical Microsoft SharePoint flaw now exploited in attacks
360预警:Sorry勒索病毒集中开火,专挑中小型企业“偷家”
独家!OpenClaw之父确认漏洞,360为所有“养虾人”筑牢安全防线
Вы хотели бы стать директором Apple? Целых пять месяцев это можно было сделать лишь одной кнопкой
AI教科书级防御,化解一场真实攻击
纽创信安与SGS启动网络安全ISO 21434认证项目
EDR killers are now standard equipment in ransomware attacks
Ransomware attackers routinely deploy tools designed to disable endpoint detection and response software before launching encryptors. These tools, known as EDR killers, have become a standard component of ransomware intrusions. ESET Research tracked nearly 90 EDR killers actively used in the wild. The workflow is consistent across groups: an attacker gains high privileges, deploys an EDR killer to disrupt security software, then runs the encryptor. Affiliates prefer this approach because it gives them a brief, … More →
The post EDR killers are now standard equipment in ransomware attacks appeared first on Help Net Security.