issues
search
chainreactors
/
picker
将你的repo变为讨论社区
GNU General Public License v3.0
104
stars
19
forks
source link
[每日信息流] 2024-06-21
#569
Closed
chainreactorbot
closed
2 months ago
chainreactorbot
commented
3 months ago
每日安全资讯(2024-06-21)
SecWiki News
[ ]
SecWiki News 2024-06-20 Review
paper - Last paper
[ ]
N-days Chaining 漏洞利用分析 Part 5:VMware Workstation 客户端到主机逃逸
Private Feed for M09Ic
[ ]
Rvn0xsy starred JanDeDobbeleer/oh-my-posh
[ ]
Rvn0xsy starred 0linlin0/XPost
[ ]
Rvn0xsy starred phiresky/ripgrep-all
[ ]
Rvn0xsy starred tsale/EDR-Telemetry
[ ]
Rvn0xsy starred tyranid/oleviewdotnet
[ ]
Rvn0xsy starred sshallow/WhoUsesCookies
[ ]
Rvn0xsy starred jvm-rasp/jrasp-agent
[ ]
Rvn0xsy starred smol-rs/polling
[ ]
Rvn0xsy starred zincsearch/zincsearch
[ ]
theLSA starred cerebroapp/cerebro
[ ]
theLSA starred rubickCenter/rubick
[ ]
theLSA starred Ulauncher/Ulauncher
[ ]
Rvn0xsy starred y21/tl
[ ]
Rvn0xsy starred chroblert/JSigThief
[ ]
Rvn0xsy starred hatoo/oha
[ ]
ourren starred al0ne/cloud-audit
[ ]
zema1 starred lintstar/CS-AutoPostChain
[ ]
zema1 starred EgeBalci/deoptimizer
[ ]
timwhitez starred EgeBalci/deoptimizer
[ ]
Ak74-577 starred p0dalirius/smbclient-ng
[ ]
VirtualAlllocEx made VirtualAlllocEx/Workshop-Tests public
[ ]
su18 forked su18/jattach from jattach/jattach
[ ]
su18 starred novysodope/javaeasyscan
[ ]
gh0stkey starred novysodope/javaeasyscan
[ ]
su18 starred xnio/xnio
[ ]
wabzsy starred snipe/snipe-it
[ ]
Wh0ale starred gh0stkey/Web-Fuzzing-Box
[ ]
timwhitez starred secretsquirrel/SigThief
[ ]
timwhitez starred evilsocket/legba
Verne in GitHub
[ ]
Voicenotes 一款 AI 语音笔记应用
Files ≈ Packet Storm
[ ]
Debian Security Advisory 5717-1
[ ]
TURPENTINE XNU Kernel Buffer Overflow
[ ]
Ubuntu Security Notice USN-6842-1
[ ]
Debian Security Advisory 5716-1
[ ]
Ubuntu Security Notice USN-6841-1
[ ]
Red Hat Security Advisory 2024-4016-03
[ ]
Red Hat Security Advisory 2024-4015-03
[ ]
Red Hat Security Advisory 2024-4014-03
[ ]
Red Hat Security Advisory 2024-4004-03
[ ]
Red Hat Security Advisory 2024-4003-03
[ ]
Red Hat Security Advisory 2024-4002-03
[ ]
Red Hat Security Advisory 2024-4001-03
[ ]
Red Hat Security Advisory 2024-4000-03
[ ]
Red Hat Security Advisory 2024-3999-03
[ ]
Red Hat Security Advisory 2024-3998-03
[ ]
Red Hat Security Advisory 2024-3989-03
[ ]
Red Hat Security Advisory 2024-3918-03
[ ]
Red Hat Security Advisory 2024-3881-03
Twitter @Nicolas Krassas
[ ]
Atlassian fixed six high-severity bugs in Confluence Data Center and Server https://securityaffairs.com/164743/security/atlassian-confluence-crucible-...
[ ]
Crypto exchange Kraken accuses blockchain security outfit CertiK of extortion https://go.theregister.com/feed/www.theregister.com/2024/06/20/kraken_ce...
[ ]
UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs https://www.bleepingcomputer.com/news/security/unc3886-hackers-use-linux-rootkits-to-hid...
[ ]
Rafel RAT, Android Malware from Espionage to Ransomware Operations https://research.checkpoint.com/2024/rafel-rat-android-malware-from-espionage-to-ra...
[ ]
BokuLoader - A Proof-Of-Concept Cobalt Strike Reflective Loader Which Aims To Recreate, Integrate, And Enhance Cobalt Strike's Evasion Features! http:...
[ ]
CDK Global hacked again while recovering from first cyberattack https://www.bleepingcomputer.com/news/security/cdk-global-hacked-again-while-recoverin...
[ ]
SolarWinds Serv-U path-traversal flaw actively exploited in attacks https://www.bleepingcomputer.com/news/security/solarwinds-serv-u-path-traversal-fl...
[ ]
Biden to ban US sales of Kaspersky software over ties to Russia, source says https://www.reuters.com/technology/biden-ban-us-sales-kaspersky-software-...
[ ]
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
[ ]
New Rust infostealer Fickle Stealer spreads through various attack methods https://securityaffairs.com/164726/malware/fickle-stealer-attack-methods.ht...
[ ]
Beyond the @ Symbol: Exploiting the Flexibility of Email Addresses For Offensive Purposes https://modzero.com/en/blog/beyond_the_at_symbol/
[ ]
Qilin: We knew our Synnovis attack would cause a healthcare crisis at London hospitals https://go.theregister.com/feed/www.theregister.com/2024/06/20/...
[ ]
TikTok facing fresh lawsuit in US over children’s privacy https://www.malwarebytes.com/blog/news/2024/06/tiktok-facing-fresh-lawsuit-in-us-over-child...
[ ]
Amtrak Confirms Crooks Are Breaking Into User Accounts, Derailing Email Addresses https://packetstormsecurity.com/news/view/36017/Amtrak-Confirms-Croo...
[ ]
Russia's cyber spies still threatening French national security, democracy https://go.theregister.com/feed/www.theregister.com/2024/06/20/russias_cybe...
[ ]
A burp extension creates dynamic payloads to reveal injection flaws(LFI, RCE, SQLi), generates user access tables to spot authentication/authorization...
[ ]
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021 https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
[ ]
Recovering Public Keys from Signatures https://www.schneier.com/blog/archives/2024/06/recovering-public-keys-from-signatures.html
[ ]
An unpatched bug allows anyone to impersonate Microsoft corporate email accounts https://securityaffairs.com/164675/hacking/expert-warns-of-a-spoofing...
Trustwave Blog
[ ]
Upcoming Trustwave Webinar: Maximizing the Value of Microsoft E5
Doonsec's feed
[ ]
别睡太晚 别爱太满 别想太多
[ ]
免费下载,麒麟软件开源:安全编码文档和编码规范文档
[ ]
Hikvision海康综合安防管理平台applyAutoLoginTicket接口存在远程命令执行漏洞 附POC
[ ]
百度安全X盈科全球数据合规服务中心:共绘“人工智能+法律服务”创新蓝图
[ ]
盗洞空间-交流群
[ ]
漏洞管工具 -- miscan(6月17日更新)
[ ]
红队实战教学 -- 如何通过自动化POC检测来识别软件中的漏洞
[ ]
【OSCP】university
[ ]
重定向跳转 -> XSS漏洞 -> 升级高危
[ ]
我国开设“密码科学与技术”本科专业的高校增加至20所
[ ]
邬江兴院士:云时代面临新安全风险,构建内生安全体系是关键
[ ]
《网络安全技术 关键信息基础设施安全保护能力指标体系》等2项国家标准对外征求意见
[ ]
“数据要素×”典型案例之十一 | 图书出版数据融合创新应用推动产业转型升级
[ ]
IntelBroker黑客入侵苹果公司,窃取多个工具源代码
[ ]
做为五大安全架构之首的零信任,到底能解决什么问题?
[ ]
揭秘PHP反序列化漏洞-入门:黑客是如何入侵你的网站的?
[ ]
逆向学习Windows篇 -- 如何打开进程获取句柄、句柄在进程中的作用、如何使用句柄打开进程、每个进程的句柄表以及句柄的继承方
[ ]
逆向学习Windows篇 -- 打开文件、获取文件大小等文件操作
[ ]
逆向学习Windows篇 -- 文件映射的原理和操作方法
[ ]
逆向学习Windows篇 -- 文件映射在进程间通信中的应用
[ ]
逆向学习Windows篇 -- 线程和进程之间的关系以及各自的作用
[ ]
逆向学习Windows篇 -- 线程和进程的相关知识
[ ]
逆向学习Windows篇 -- 多进程和信号量的概念及其应用和注册表的相关知识
[ ]
逆向学习Windows篇 -- 如何配置项目目录属性
[ ]
[BUUCTF从零单排] Web方向 01.Web入门篇之粗心的小李解题思路
[ ]
他可以做到配合AI模型自动翻译视频和生成字幕
[ ]
华测监测预警系统2.2 UserEdit.aspx sql注入
[ ]
写几句废话
[ ]
SSH协议不再安全-揭秘SSH协议前缀截断攻击
[ ]
【车联网】现代汽车Ioniq SEL渗透测试(5)
[ ]
大模型参加“高考”,成绩如何?
[ ]
首届数字“三品”创新发展大赛决赛评审会在京举行
[ ]
新的基于 Rust 的善变恶意软件使用 PowerShell 进行 UAC 绕过和数据泄露
[ ]
VMware vCenter Server 关键 RCE 漏洞 (CVE-2024-37079, CVE-2024-37080)
[ ]
Ai帮读
[ ]
甲方安全建设-利用AI大模型协助安全运营
[ ]
解决VulnHub靶机分配不到IP
[ ]
Spark向量化计算在美团生产环境的实践
[ ]
报名 | MARS TALK 第03期:无人机导航定位技术
[ ]
回顾 | MARS TALK 第01&02期:无人机安全可靠性分析与实践、机器人多模感知技术分享
[ ]
国密SM系列加解密图形化工具
[ ]
618 倒计时 | 大促捡漏,120+ 软件超值低价错过等半年!
[ ]
安天API雷达在线直播 | 来看产品经理怎么说?
[ ]
【资讯】工信部科技司就《5G移动通信网 核心网多播广播增强技术要求》等135项行业标准、7项推荐性国家标准计划项目公开征求意见
[ ]
【资讯】湖南省工信厅公布《湖南省工业和信息化领域网络安全和数据安全管理支撑机构名单》
[ ]
星火阵地|北京市经济和信息化局总经济师唐建国一行到工业互联网数字化转型促进中心(北京)参观调研
[ ]
《云原生安全攻防》-- 容器环境下的攻击行为
[ ]
不是,电台上都开始讨论这种网安话题?
[ ]
精华版 | 2024 Q1全球威胁报告一览
[ ]
r2frida:基于Frida的远程进程安全检测和通信工具
[ ]
【安全圈】仪陇公安破获一起黑客犯罪案件,1.2亿元!4个团伙,14人被判刑
[ ]
【安全圈】CDK Global 遭遇攻击导致系统中断,影响数千家美国汽车经销商
[ ]
【安全圈】美国铁路客运巨头 Amtrak 泄漏旅客数据
[ ]
【安全圈】UNC3886 使用 Fortinet、VMware 0-Day 和隐身战术进行长期监视
[ ]
安全加固规范/基线检查脚本合集(附下载地址)
[ ]
2024HW红蓝情报交流群
[ ]
CVPR 2024 | 开展啦,来OPPO展位体验移动AI最新技术!
[ ]
五年蝉联!盛邦安全荣登中国Web应用防火墙市场领军榜TOP5
[ ]
免费 | 长沙市网络安全工匠之渗透测试工匠班开班啦!
[ ]
齐向东一行到访华东空管局交流
[ ]
大型集团攻防演练如何不被分支机构拉垮?
[ ]
2024年第五期CCSC-DF电子数据取证方向认证培训开启报名!暑期特惠
[ ]
工信部通报22款App
[ ]
江门农商银行数字银行部招募多个数据相关岗位
[ ]
XDR领跑!亚信安全位居IDC MarketScape中国扩展检测与响应平台领导者类别
嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
[ ]
开票!ISC.AI 2024七月北京启幕,限量早鸟票最高优惠直降4000
[ ]
挑战无界,少年无畏!丨第四届极客少年挑战赛于6月20日正式开启报名!
[ ]
2024 年移动统计数据威胁演变趋势
Security Boulevard
[ ]
Report Details Reemergence of Lockbit 3.0 Ransomware Syndicate
[ ]
Cyber A.I. Group Announces the Engagement of Walter L. Hughes as Chief Executive Officer
[ ]
Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code
[ ]
Identity Fraud Does Not Discriminate
[ ]
Digital Identity: There’s a Lot at Stake
[ ]
USENIX Security ’23 – FirmSolo: Enabling Dynamic Analysis Of Binary Linux-Based IoT Kernel Modules
[ ]
The Forgotten Need for Network Observability in the Rush to Migrate to the Cloud
[ ]
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #294 — Enabling Flow
[ ]
EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped
[ ]
Stopping Cyber Attacks Against the Financial Sector: Four Use Cases
Google Online Security Blog
[ ]
Staying Safe with Chrome Extensions
cloud world
[ ]
Golang 空结构体的底层原理和其使用
[ ]
Go 如何基于 MVS 解决依赖关系问题
Reverse Engineering
[ ]
CVE-2024-27815 Writeup
SentinelOne
[ ]
AWS re:Inforce 2024 Recap | Developing Security Culture, Inclusion, and Education
blog.avast.com EN
[ ]
A College Student’s Guide To Avoiding Dating App Scams | Avast
Malwarebytes
[ ]
TikTok facing fresh lawsuit in US over children’s privacy
GuidePoint Security
[ ]
SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment
SpiderLabs Blog
[ ]
Fare Thee Well ModSecurity: End-of-Life and Last Commercial Rules Update for June 2024
Wallarm
[ ]
PCI DSS v4.0: What You Need to Know and What the End of v3.2.1 Means for the Future of Digital Payments
Project Zero
[ ]
Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models
daniel.haxx.se
[ ]
Inside 22,734 Steam games
FreeBuf网络安全行业门户
[ ]
FreeBuf早报 | 关于侵害用户权益行为的APP(SDK)通报;葡萄牙某银行客户数据泄露
[ ]
全球正运用的Microsoft SQL Server有近五分之一为过时版本
[ ]
苹果公司遭黑客入侵,部分工具源代码被盗
[ ]
CDK Global 遭遇攻击导致系统中断,影响数千家美国汽车经销商
安全牛
[ ]
如何绘制网络安全运营的“谷歌地图”?
[ ]
研究人员发现一种可绕过PowerShell安全防护和AMSI检测的新型走私攻击;AMD就机密数据泄漏事件展开紧急调查 | 牛览
[ ]
以数智化重塑IT审计的未来
绿盟科技技术博客
[ ]
VMware vCenter Server多个高危漏洞(CVE-2024-37079/CVE-2024-37080/CVE-2024-37081)通告
奇客Solidot–传递最新科技情报
[ ]
语言主要是为了沟通不是为了推理
[ ]
自动驾驶汽车更擅长直行人类更擅长转弯
[ ]
Y 染色体演化速快于 X 染色体
[ ]
天文学家实时观测黑洞的苏醒
[ ]
微软邮箱漏洞允许任何人冒充该公司员工
[ ]
中国公司帮助缅甸屏蔽 VPN
[ ]
因年龄验证 Pornhub 将再屏蔽美国五个州的网民访问其网站
[ ]
日本研究发现改进英文写作能力的关键不是掌握复杂语法
[ ]
OpenAI 联合创始人 Ilya Sutskever 成立新公司 Safe Superintelligence
HackerNews
[ ]
T-Mobile 否认遭黑客攻击,泄露数据疑似与其供应商漏洞有关
[ ]
美国铁路客运巨头 Amtrak 泄漏旅客数据
[ ]
涉及计算机欺诈|交易额达4.3亿美元的暗网市场经营者被起诉
[ ]
UNC3886 使用 Fortinet、VMware 0-Day 和隐身战术进行长期监视
[ ]
IntelBroker 黑客声称入侵苹果公司,已窃取内部工具源代码
KitPloit - PenTest & Hacking Tools
[ ]
BokuLoader - A Proof-Of-Concept Cobalt Strike Reflective Loader Which Aims To Recreate, Integrate, And Enhance Cobalt Strike's Evasion Features!
锦行科技
[ ]
【喜报】锦行科技荣获国家信息安全漏洞库“年度漏洞消控优秀贡献奖”
Black Hills Information Security
[ ]
From High School to Cyber Ninja—For Free (Almost)!
看雪学苑
[ ]
破解小米手表S3实现原神启动
[ ]
白帽黑客还是敲诈勒索?某安全团队疑似在披露漏洞的同时盗走300万美元加密资产
[ ]
已完结!eBPF 安全开发与攻防对抗
丁爸 情报分析师的工具箱
[ ]
【福利】200份纸质版免费领,《虚拟货币调证指南》发布,一册在手涉币案件调证难题不再发愁!
[ ]
【AI速读】印度的强迫劳动《糖的残酷:债务、童婚和子宫切除术》
dotNet安全矩阵
[ ]
.NET 一款免杀的Suo5隧道代理脚本
[ ]
两个国内最专业的.NET安全知识库
安全内参
[ ]
因外包人员失误:这家保险巨头内网沦陷、发生严重数据泄露事件
[ ]
北京一男子售卖“一键脱衣”淫秽软件,制作6000余张“裸照”
威努特安全网络
[ ]
IDC报告发布,威努特安全管理平台市场份额位列全国第二!
奇安信威胁情报中心
[ ]
疑似Kimsuky(APT-Q-2)以军工招聘为饵攻击欧洲
天御攻防实验室
[ ]
护网前夜 | 伙计,来点威胁情报吗?
关键基础设施安全应急响应中心
[ ]
基于事件相机的敏感生物信息隐私保护研究进展
[ ]
专攻中文用户!黑客组织Void Arachne夹带木马推广Deepfake和AI滥用
[ ]
Barracuda最新报告显示:有 92% 的企业曾遭遇社工攻击
数世咨询
[ ]
“第四届数字安全大会”倒计时2天
[ ]
重新定义网络安全“商品”,回归行业价值本质——对行业未来发展的商业逻辑与模式思考
中国信息安全
[ ]
“网安之夜”院校领导座谈会圆满举行——共谋实战网络安全人才产教融合培养之道
[ ]
专家解读 | 以良法善治为清朗网络空间构建法治屏障
[ ]
聚焦 | 中国—东盟数字治理对话在桂林举办
[ ]
关注 | 我国已制定网络领域立法逾150部
[ ]
通知 | 网安标委就《网络安全技术 关键信息基础设施安全保护能力指标体系(征求意见稿)》等2项国家标准征求意见
[ ]
赛事丨第四届极客少年挑战赛于6月20日正式开启报名
[ ]
行业 | 科蓝软件斩获3567万大单,金融科技助力乡村振兴迈入新时代
[ ]
注意 | 自查!卸载!这15款违规移动应用被通报!
CNCERT国家工程研究中心
[ ]
简析数字风险管理的常用方法和关键能力
[ ]
承包政府系统上线前未做安全测试,两家知名企业被罚8200万元
[ ]
CISA 称 Windows 漏洞可能被利用于勒索软件攻击
极客公园
[ ]
前 OpenAI 科学家建「安全超级智能」实验室;小红书 618:直播订单增 5 倍;新一代哈弗 H6 上市|极客早知道
小米安全中心
[ ]
【MiSRC助力】攻防演练场景下的漏洞挖掘与治理 | 安全范儿沙龙开启
情报分析师
[ ]
2024年蒙古国大选分析
[ ]
GRU军官和克格勃军官在训练、行动和心态方面有什么区别?
微步在线
[ ]
开局就扔“王炸”?0day不要钱啊
嘶吼专业版
[ ]
2024 年移动统计数据威胁演变趋势
阿里安全响应中心
[ ]
阿里云安全保障招聘多个岗位
复旦白泽战队
[ ]
讲座回顾|上海科技大学助理教授陈宇奇:自动驾驶汽车事故记录因果分析框架
网安杂谈
[ ]
最新丨《虚拟货币调证指南》发布,一册在手涉币案件调证难题不再发愁!(200份纸质版免费领)
腾讯安全威胁情报中心
[ ]
情报速递20240620|利用开源远程控制程序进行的钓鱼攻击
深信服千里目安全技术中心
[ ]
【漏洞通告】Rancher Kubernetes Engine敏感信息泄露漏洞(CVE-2023-32191)
Beacon Tower Lab
[ ]
Suricata引擎二次开发之命中规则定位
360数字安全
[ ]
360强势“上”港,开启海外市场新篇章
[ ]
聚焦安全和AI双域,ISC.AI 2024早鸟票618限量发售!
安全419
[ ]
格尔软件:抗量子密码(PQC)将谱写量子计算时代的新安全出路
[ ]
第四届极客少年挑战赛于6月20日正式开启报名
TrustedSec
[ ]
Let’s Clone a Cloner...To Meet My Needs
Over Security - Cybersecurity news aggregator
[ ]
Biden bans Kaspersky antivirus software in US over security concerns
[ ]
Linux version of RansomHub ransomware targets VMware ESXi VMs
[ ]
CosmicSting flaw impacts 75% of Adobe Commerce, Magento sites
[ ]
Phoenix UEFI vulnerability impacts hundreds of Intel PC models
[ ]
New North Korean based backdoor packs a punch
[ ]
Cyberattack on CDK Global stymies work at car dealerships across US
[ ]
US bans sale of Kaspersky software citing security risk from Russia
[ ]
US to ban Kaspersky Lab software nationwide later this year
[ ]
KrebsOnSecurity Threatened with Defamation Lawsuit Over Fake Radaris CEO
[ ]
More than 12,000 Santander employees in US affected by Snowflake breach
[ ]
Tabletop exercises are headed to the next frontier: Space
[ ]
UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs
[ ]
Single Sign-On Or Single Point of Failure?
[ ]
SolarWinds Serv-U path-traversal flaw actively exploited in attacks
[ ]
CDK Global hacked again while recovering from first cyberattack
[ ]
More than 400,000 have data leaked in cyberattack on Texas education organization
[ ]
New hacker group targets Chinese users with compromised deepfake porn software and malicious VPN installers
[ ]
Wireless attack scenario: probing
[ ]
Russian spies' hacking campaign is 'endangering' French diplomatic interests
[ ]
NetHunter Hacker XVI: Metasploit payload generator in your pocket
[ ]
Criminal gang behind London hospitals cyberattack lists victim on darknet site
[ ]
UN Security Council to debate cybersecurity threats, despite Russian veto
[ ]
Proteggersi dai deepfake usando tecniche di riconoscimento facciale
[ ]
Efficiency driven SOC operations
[ ]
Kaspersky annuncia Cloud Workload Security per proteggere il cloud
[ ]
[Phishing] Current state of phishing threat using Paris 2024 Olympic games branding (June 24)
[ ]
piADina – Italian Recipe for Internal Penetration Testing
[ ]
T-Mobile denies it was hacked, links leaked data to vendor breach
Securityinfo.it
[ ]
Proteggersi dai deepfake usando tecniche di riconoscimento facciale
[ ]
Kaspersky annuncia Cloud Workload Security per proteggere il cloud
迪哥讲事
[ ]
重定向跳转 -> XSS漏洞 -> 升级高危
ICT Security Magazine
[ ]
Ecosistema ransomware
娜璋AI安全之家
[ ]
[BUUCTF从零单排] Web方向 01.Web入门篇之粗心的小李解题思路
Qualys Security Blog
[ ]
Secure Your Containerized Environments with Qualys Containerized Scanner Appliance (QCSA)
FuzzWiki
[ ]
技术进展 | HNPFuzzer:基于共享内存的高速网络协议模糊测试框架
Yoroi Warning Archive Feed
[ ]
Warning: Vulnerabilità critica in PHP sfruttata in the wild
SANS Internet Storm Center, InfoCON: green
[ ]
No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary], (Thu, Jun 20th)
Posts By SpecterOps Team Members - Medium
[ ]
How Privileged Identity Management Affects Conditional Access Policies
The Hacker News
[ ]
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
[ ]
French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
[ ]
Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
[ ]
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
[ ]
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
[ ]
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Tor Project blog
[ ]
New Release: Tor Browser 13.5
Deeplinks
[ ]
Opposing a Global Surveillance Disaster | EFFector 36.8
[ ]
Police are Using Drones More and Spending More For Them
Schneier on Security
[ ]
Recovering Public Keys from Signatures
Information Security
[ ]
Urgent : CVE-2023-32191 (CVSS 10) : Upgrade your Rancher Kubernetes Engine (RKE) Right NOW !!
Graham Cluley
[ ]
Qilin ransomware: What you need to know
[ ]
Ransomware attacks skyrocket, with LockBit 3.0 at the forefront
netsecstudents: Subreddit for students studying Network Security and its related subjects
[ ]
My experience setting up a secure Remote Desktop
Trend Micro Research, News and Perspectives
[ ]
Worldwide 2023 Email Phishing Statistics and Examples
Your Open Hacker Community
[ ]
Where to find game logic within it’s .APK?
Security Affairs
[ ]
US bans sale of Kaspersky products due to risks to national security
[ ]
Atlassian fixed six high-severity bugs in Confluence Data Center and Server
[ ]
China-linked spies target Asian Telcos since at least 2021
[ ]
New Rust infostealer Fickle Stealer spreads through various attack methods
[ ]
An unpatched bug allows anyone to impersonate Microsoft corporate email accounts
[ ]
Smishing Triad Is Targeting Pakistan To Defraud Banking Customers At Scale
TorrentFreak
[ ]
Piracy Shield 2.0 IPTV Blocking Costs Will Be Paid By Italian Taxpayers
[ ]
Ghana Warns Local TV Stations Not to Air ‘Pirated’ Films
The Register - Security
[ ]
Crooks get their hands on 500K+ radiology patients' records in cyber-attack
[ ]
Biden bans Kaspersky: No more sales, updates in US
[ ]
Car dealer software bigshot CDK pulls systems offline twice amid 'cyber incident'
[ ]
Crypto exchange Kraken accuses blockchain security outfit CertiK of extortion
[ ]
Russia's cyber spies still threatening French national security, democracy
[ ]
Qilin: We knew our Synnovis attack would cause a healthcare crisis at London hospitals
Krebs on Security
[ ]
KrebsOnSecurity Threatened with Defamation Lawsuit Over Fake Radaris CEO
Blackhat Library: Hacking techniques and research
[ ]
Youtube automation stations (discussion)
[ ]
spotify automation
[ ]
How would I sell corporate information?
Computer Forensics
[ ]
[Documentation] - IOS formation
[ ]
Whatsapp Web Forensics
[ ]
Barracuda email backups
[ ]
Activitiescache.db Win11
[ ]
Roadmap to learn Forensics
[ ]
Data files from ALEAPP and iLEAPP scripts
[ ]
Unlocking Volatility in Autopsy
Social Engineering
[ ]
How to deal with the leader of your group who calls you names
[ ]
Aside from Dale Carnegie and Robin Dreek, what other good authors have books on elicitation for social engineering?
[ ]
Could this sub have a long list of flags at varying difficulty levels?
Technical Information Security Content & Discussion
[ ]
A Case Study About Exploiting the Flexibility of Email Addresses For OS Command Injection
KitPloit - PenTest Tools!
[ ]
BokuLoader - A Proof-Of-Concept Cobalt Strike Reflective Loader Which Aims To Recreate, Integrate, And Enhance Cobalt Strike's Evasion Features!
Blaze's Security Blog
[ ]
New North Korean based backdoor packs a punch
Security Weekly Podcast Network (Audio)
[ ]
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
每日安全资讯(2024-06-21)