-
Notifications
You must be signed in to change notification settings - Fork 37
Open
Labels
Description
每日安全资讯(2026-03-11)
- Private Feed for M09Ic
- bolucat released 202603101959 at bolucat/Archive
- mgeeky starred atomiczsec/Adrenaline
- safedv starred cloudflare/pingora
- liamg contributed to infracost/cli
- PeiQi0 starred HKUDS/CLI-Anything
- 0xbug starred D4Vinci/Scrapling
- pydantic released v0.0.8 at pydantic/monty
- IC3-CR3AM starred openclaw/openclaw
- liamg contributed to infracost/go-proto
- mgeeky starred uf0o/windows-ps-callbacks-experiments
- niudaii starred SanMuzZzZz/LuaN1aoAgent
- gh0stkey starred RedTeamPentesting/pretender
- PrefectHQ released 3.6.22.dev6 at PrefectHQ/prefect
- Y4er starred deviantony/docker-elk
- uknowsec starred dalangdalang934/freedomtrader
- FunnyWolf starred microsoft/presidio
- SecWiki News
- bunnie's blog
- 安全客-有思想的安全新媒体
- Windows 12的幻影 微软如何用AI重构取代全新系统发布
- 依托Polygon公链 越南黑客组织通过GitHub部署历经16代迭代的LuaJIT恶意程序
- OpenAI依托ChatGPT技术打造AI搜索引擎,正面对标谷歌搜索
- AVideo平台存在高危零点击命令注入漏洞 可被用于劫持直播流
- 恶意浏览器插件针对imToken用户窃取私钥
- Viber即时通讯软件存在TLS漏洞,Cloak代理模式失效并导致用户暴露
- 黑客可利用间接提示注入攻击 借助外部内容操控AI智能体
- 海康威视与罗克韦尔自动化高危漏洞纳入CISA已知被利用漏洞清单
- OpenAI发布GPT-5.4大模型,具备更强推理、编码与计算机操作能力
- 黑客利用OpenClaw、GitHub与Bing传播恶意软件,攻击手段极具隐蔽性
- paper - Last paper
- LoRexxar's Blog | 信息技术分享
- 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
- Tenable Blog
- Recent Commits to cve:main
- CCC Event Blog
- Securelist
- SentinelOne
- Malwarebytes
- Reverse Engineering
- Reverse Engineering Binaries With AI
- Reverse engineering FORM swim goggles: custom protobuf over BLE, 697 captured API requests, full protocol documented
- Released a crackme this week. Someone reconstructed the hash in Python, brute forced for an hour - then patched the jump. That was the correct solution.
- IronPE - Minimal Windows PE manual loader written in Rust.
- I've made indent guides plugin for IDA
- $10K in Bounties | 30-Day Runtime Enforcement Challenge Break Churchill. If you can.
- Your Duolingo Is Still Talking to ByteDance: How Pangle Fingerprints You Across Apps After You Said No
- Didier Stevens
- daniel.haxx.se
- 杨龙
- HackerNews
- 黑海洋Wiki | AI机器人硬件开发 | 网络安全攻防实战 | 区块链技术文档教程 - 免费资源平台
- 奇客Solidot–传递最新科技情报
- 安全分析与研究
- 腾讯玄武实验室
- 威努特安全网络
- 雷神众测
- 青衣十三楼飞花堂
- 代码卫士
- 黑鸟
- 安全内参
- 绿盟科技研究通讯
- 天御攻防实验室
- 黑哥虾撩
- 天黑说嘿话
- 安全研究GoSSIP
- 看雪学苑
- 奇安信 CERT
- 安全圈
- 吾爱破解论坛
- 威胁棱镜
- 中国信息安全
- 安全牛
- 青藤云安全
- 字节跳动安全中心
- 极客公园
- 嘶吼专业版
- 枇杷熟了
- OPPO安全中心
- 深信服千里目安全技术中心
- 安全行者老霍
- TrustedSec
- 360数字安全
- LR的安全自留地
- 迪哥讲事
- Qualys Security Blog
- 国家互联网应急中心CNCERT
- Over Security - Cybersecurity news aggregator
- New ‘BlackSanta’ EDR killer spotted targeting HR departments
- Microsoft Patch Tuesday for March 2026 — Snort rules and prominent vulnerabilities
- New BeatBanker Android malware poses as Starlink app to hijack devices
- DOGE employee stole Social Security data and put it on a thumb drive, report says
- New 'Zombie ZIP' technique lets malware slip past security tools
- Microsoft releases Windows 10 KB5078885 extended security update
- U.S. military contractor likely built iPhone hacking tools used by Russian spies in Ukraine
- Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
- Cyber Resilience Act: ecco come le imprese dovranno adeguarsi
- Fattore umano nella cyber: le lezioni tratte dalle multe per GDPR e data breach
- Windows 11 KB5079473 & KB5078883 cumulative updates released
- HPE warns of critical AOS-CX flaw allowing admin password resets
- Rudd confirmed to head NSA, Cyber Command after near year-long vacancy
- Asset Security e classificazione: quando un’etichetta vale più di un firewall
- Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
- New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
- Finnish intelligence warns of persistent cyber espionage from Russia, China
- The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
- Cybercriminals impersonating city officials to steal permit payments, FBI says
- CISA shortens patch deadline for critical Ivanti, SolarWinds bugs
- UK plans to shift fraud fight onto telecoms, tech companies
- Plug-in di Chrome cambiano proprietà e diventano malware
- Russian military hackers revive advanced malware to spy on Ukraine, researchers say
- CISA: Recently patched Ivanti EPM flaw now actively exploited
- OAuth Device Code Phishing: A New Microsoft 365 Account Breach Vector
- Microsoft to enable Windows hotpatch security updates by default
- APT28 hackers deploy customized variant of Covenant open-source tool
- BeatBanker: A dual‑mode Android Trojan
- Kali & LLM: Completely local with Ollama & 5ire
- Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why
- Cos’è vibeware, l’industrializzazione dei malware potenziata dalle AI
- Cyberattack Forces Polish Hospital Revert to Paper-Based Operations
- Governare l’accesso per governare il rischio: la classificazione della documentazione nella NIS 2
- AI Chatbots are Sneakily Directing Users to Illegal Online Casinos
- Nasscom Calls for Vigilance as Firms Brace for Impact from West Asia Conflict
- An iPhone-hacking toolkit used by Russian spies likely came from U.S military contractor
- 字节跳动技术团队
- IT Service Management News
- 安全419
- Kali Linux
- Dark Space Blogspot
- Securityinfo.it
- ICT Security Magazine
- Troy Hunt's Blog
- SANS Internet Storm Center, InfoCON: green
- Lenny Zeltser
- 白泽安全实验室
- Schneier on Security
- 云鼎实验室
- The Hacker News
- How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
- KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
- New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
- The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
- Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
- CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
- NetSPI
- SEI Blog
- Trend Micro Research, News and Perspectives
- Deeplinks
- Security Affairs
- Microsoft Patch Tuesday security updates for March 2026 fixed 84 bugs
- Attackers exploit FortiGate devices to access sensitive network information
- APT28 conducts long-term espionage on Ukrainian forces using custom malware
- Threat actors use custom AuraInspector to harvest data from Salesforce systems
- U.S. CISA adds Ivanti EPM, SolarWinds, and Omnissa Workspace One flaws to its Known Exploited Vulnerabilities catalog
- Ericsson US confirms breach after third-party provider attack
- Law enforcement disrupted Tycoon 2FA phishing-as-a-service platform
- The Register - Security
- Critical Microsoft Excel bug weaponizes Copilot Agent for zero-click information disclosure attack
- Cybercrime isn't just a cover for Iran's government goons - it's a key part of their operations
- Crooks compromise WordPress sites to push infostealers via fake CAPTCHA prompts
- Fake job applications pack malware that kills EDR before stealing data
- Ericsson blames vendor vishing slip-up for breach exposing thousands of records
- Protecting democracy means democratizing cybersecurity. Bring on the hackers
- Polish cops bust alleged teen DDoS kit sellers – youngest just 12
- Your Open Hacker Community
- Decrypting chrome passwords
- Cracking / recovering a .Rar file
- Can’t see a contact’s profile picture anymore—restricted or just removed?
- Running Javascript in Android pdf reader.
- is a school chromebook info stealer possible?
- Uhh I want to learn game cracking
- Hacking a unit ut60bt Multimeter
- Go to for binary harness setup?
- Hack Career
- Computer Forensics
- Blackhat Library: Hacking techniques and research
- Information Security
- Complete Firmwares, Drivers, Processes, Services, Registry Security Tool For Advanced Users (Windows)
- How to prevent sensitive data from being shared through risky websites across endpoints
- WEBSITE PORTFOLIO - TRUST
- Generating Intentionaly vulnerable application
- Are firewalls still the backbone of SMB security, or just one layer people overestimate now?
- netsecstudents: Subreddit for students studying Network Security and its related subjects
- Social Engineering
- Technical Information Security Content & Discussion
- How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit
- Classifying email providers of 2000+ Swiss municipalities via DNS, looking for feedback on methodology
- Your Duolingo Is Still Talking to ByteDance: How Pangle Fingerprints You Across Apps After You Said No
- Electric Eye – a Rust/WASM Firefox extension to detect AitM proxies via DOM analysis, TLS fingerprinting and HTTP header inspection
- Trust no one: are one-way trusts really one way?
- GRAHAM CLULEY
- TorrentFreak
- DEFION Research Labs
- Ruckus Unleashed: Multiple vulnerabilities exploited
- Pwn2Own Automotive 2024: Hacking the Autel MaxiCharger
- Pwn2Own Automotive 2024: Hacking the JuiceBox 40
- Pwn2Own Automotive 2024: Hacking the ChargePoint Home Flex (and their cloud...)
- DoNex/DarkRace Ransomware Decryptor
- CVE-2024-20693: Windows cached code signature manipulation
- Bringing process injection into view(s): exploiting all macOS apps using nib files
- Don’t Talk All at Once! Elevating Privileges on macOS by Audit Token Spoofing
- Getting SYSTEM on Windows in style
- Technical analysis of the Genesis Market
- Bad things come in large packages: .pkg signature verification bypass on macOS
- Pwn2Own Miami 2022: ICONICS GENESIS64 Arbitrary Code Execution
- Pwn2Own Miami 2022: Unified Automation C++ Demo Server DoS
- Pwn2Own Miami 2022: AVEVA Edge Arbitrary Code Execution
- Process injection: breaking all macOS security layers with a single vulnerability
- Pwn2Own Miami 2022: Inductive Automation Ignition Remote Code Execution
- Pwn2Own Miami 2022: OPC UA .NET Standard Trusted Application Check Bypass
- CoronaCheck App TLS certificate vulnerabilities
- Sandbox escape + privilege escalation in StorePrivilegedTaskService
- Proctorio Chrome extension Universal Cross-Site Scripting
- Zoom RCE from Pwn2Own 2021
- Adobe Acrobat privilege escalation
- iOS VPN support: 3 different bugs
- Sign in with Apple - authentication bypass
- Jenkins - authentication bypass
- DNS rebinding for HTTPS
- Spring Security - insufficient cryptographic randomness
- XenServer - path traversal leading to authentication bypass
- Volkswagen Auto Group MIB infotainment system - unauthenticated remote code execution as root
- NAPALM - command execution on NAPLM controller from host
- MySQL Connector/J - Unexpected deserialisation of Java objects
- Ansible - command execution on Ansible controller from host
- Observium - unauthenticated remote code execution
- cSRP/srpforjava - obtaining of hashed passwords
- StartEncrypt - obtaining valid SSL certificates for unauthorized domains
- 白帽子章华鹏
- Daniel Miessler
- Security Weekly Podcast Network (Audio)
Reactions are currently unavailable