资讯

A zero-day vulnerability in the Linux kernel’s SMB (Server Message Block) implementation, identified as CVE-2025-37899, has been discovered using OpenAI’s powerful language model, o3. The ...
Who’s Firing the Payloads? The digital offensive involved over 40 hacktivist groups, some new, some known: Keymous+ led high-visibility DDoS campaigns on healthcare infrastructure like AIIMS and ...
Ubiquity has disclosed two security vulnerabilities affecting its widely used video surveillance platform, UniFi Protect. One of the flaws, now assigned the identifier CVE-2025-23123, has been rated ...
Cloudflare has alerted users of a security vulnerability—tracked as CVE-2025-4366—in the widely used Pingora OSS framework. This vulnerability, a request smuggling flaw, was disco vered by a security ...
Starting May 15, the Netherlands has introduced a new law that broadens the definition of espionage and introduces stricter penalties for cyber-related offenses. The Dutch Espionage law is aimed at ...
An 18-year-old high school student from Texas has found himself at the center of a significant cybercrime investigation. Keontra Kenemore is facing a third-degree felony charge of electronic access ...
Dutch intelligence officials and Microsoft warned today of a new Russian threat actor targeting Western organizations in what appears to be a military and high-tech espionage campaign. The new threat ...
Two high-severity security flaws have been identified in Multer, a popular middleware used in Node.js applications for handling file uploads. The Multer vulnerabilities, tracked as CVE-2025-47944 and ...
Technology services provider Nelnet Servicing suffered a cyber-attack impacting data of 2.5 million student loan accounts. According to reports, personal details including names, addresses, email ...
What Is Tails OS Tails caters to a wide range of users concerned about online privacy and anonymity. Here are some key user groups who can benefit from Tails: Journalists and Activists: Working on ...
The FBI is warning that a threat group is using IT-themed social engineering calls and callback phishing emails to gain remote access to systems and steal sensitive data. The Silent Ransom Group (SRG) ...
In the world of cybersecurity, keeping up with the latest trends and challenges can feel like trying to find your footing on constantly shifting ground. With its booming digital economy and rising ...