Aggregator
【紧急寻源】网络安全项目测评急需高能!
阿里巴巴发布优化运行国产大模型的 RISC-V 服务器芯片
FCC Banned Foreign-made Consumer Routers Over Security Risks
The Federal Communications Commission (FCC) announced a major update to its Covered List, officially prohibiting the approval of new consumer-grade network routers produced in foreign countries. This regulatory action prevents these new devices from entering the United States market by denying them the required FCC equipment authorization. The decision stems from a determination by a […]
The post FCC Banned Foreign-made Consumer Routers Over Security Risks appeared first on Cyber Security News.
Apifox 供应链投毒攻击 — 完整技术分析
近日,工作中监测到 Apifox 文件存在被投毒情况。
Apifox 是一款 API 一体化协作平台,其桌面端应用基于 Electron 框架开发,提供 Windows、macOS、Linux 三平台客户端。因未严格启用 sandbox 参数,并暴露了 Node.js 的 API 接口,导致攻击者可通过 JS 控制 Apifox 的终端——三个平台均受影响。
Apifox 在启动过程中会加载:
hxxps://cdn[.]apifox[.]com/www/assets/js/apifox-app-event-tracking.min.js该文件正常大小为 34KB,但在 3 月 4 日之后可能会请求到被投毒的版本(77KB)。被投毒的 JS 文件会动态加载 hxxps://apifox[.]it[.]com/public/apifox-event.js(该域名非官方域名),在满足特定条件下加载攻击载荷,采集主机系统环境和敏感信息(SSH 密钥、Git 凭证、命令行历史、进程列表),上报到 hxxps://apifox[.]it[.]com/event/0/log。后续攻击者会控制主机拉取执行后门程序,并尝试发起横向攻击,控制更多有价值目标。
目前入口文件已被还原,仅在 Wayback Machine 存档中可见投毒版本。
Ваши данные уже могут продаваться в даркнете. Google предлагает узнать об этом первыми — автоматически
Beyond the Active Session: Hunting Offline Secrets with ProfileHound’s New Graph Edge
ProfileHound is a post-escalation tool to help find and achieve red-teaming objectives by locating domain user profiles on
The post Beyond the Active Session: Hunting Offline Secrets with ProfileHound’s New Graph Edge appeared first on Penetration Testing Tools.
LiteLLM Python Package With 95 Million Downloads Compromised by TeamPCP Hackers
A widely used open-source Python library was compromised on the Python Package Index (PyPI). Versions 1.82.7 and 1.82.8 of the package, which route requests across various LLM providers and have over 95 million monthly downloads, were found to contain a sophisticated backdoor by security vendors Endor Labs and JFrog. The malicious code was injected directly into the […]
The post LiteLLM Python Package With 95 Million Downloads Compromised by TeamPCP Hackers appeared first on Cyber Security News.
PyPI 库中的 LiteLLM 遭到入侵植入恶意代码
The Bot Numerology: How “stager_51_bot” Unmasked MuddyWater’s Global LampoRAT Campaign
Occasionally, a malicious campaign is betrayed not by labyrinthine code, but by a minuscule detail. Within the nascent
The post The Bot Numerology: How “stager_51_bot” Unmasked MuddyWater’s Global LampoRAT Campaign appeared first on Penetration Testing Tools.
The Gateway Lockdown: FCC Bans New Foreign Routers as Texas Declares War on TP-Link
The United States has resolved to exert vastly more stringent dominion over one of the most ubiquitous elements
The post The Gateway Lockdown: FCC Bans New Foreign Routers as Texas Declares War on TP-Link appeared first on Penetration Testing Tools.
The Performance Lockdown: Microsoft Blocks the Registry Hack for Faster Windows 11 SSDs
Microsoft has definitively shuttered a straightforward avenue for awakening a clandestine feature within Windows 11 that substantially accelerated
The post The Performance Lockdown: Microsoft Blocks the Registry Hack for Faster Windows 11 SSDs appeared first on Penetration Testing Tools.
The “DarkSword” Leak: How a State-Grade iPhone Cyberweapon Ended Up on GitHub for Anyone to Use
An unidentified entity has unleashed upon GitHub a nascent iteration of DarkSword—a formidable cybernetic armament that, merely a
The post The “DarkSword” Leak: How a State-Grade iPhone Cyberweapon Ended Up on GitHub for Anyone to Use appeared first on Penetration Testing Tools.
FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns
Claudy Day: The Invisible Chain That Turned Claude.ai into a Silent Data Harvester
An ordinary hyperlink to an AI chat may easily masquerade as a treacherous snare. The vanguard at Oasis
The post Claudy Day: The Invisible Chain That Turned Claude.ai into a Silent Data Harvester appeared first on Penetration Testing Tools.
The Gaddafi Lure: How a “Leaked Video” Led to the Clandestine Hijacking of Libya’s Oil Giant
The kinetic strike commenced with a sensational headline heralding a “leaked video” and culminated in clandestine dominion over
The post The Gaddafi Lure: How a “Leaked Video” Led to the Clandestine Hijacking of Libya’s Oil Giant appeared first on Penetration Testing Tools.
安全工具被入侵,引发大规模AI供应链投毒
Диктатура логики: физики доказали, что теория струн — единственный способ избежать краха законов Вселенной
The Silent Siege: How MuddyWater’s “Dindoor” Backdoor Infiltrated Critical Western Infrastructure
In the nascent days of February, several institutions across the United States, Israel, and Canada imperceptibly surrendered dominion
The post The Silent Siege: How MuddyWater’s “Dindoor” Backdoor Infiltrated Critical Western Infrastructure appeared first on Penetration Testing Tools.