-
Notifications
You must be signed in to change notification settings - Fork 40
Open
Labels
Description
每日安全资讯(2026-03-20)
- SecWiki News
- Private Feed for M09Ic
- zeroclaw-labs released v0.5.1-beta.414 at zeroclaw-labs/zeroclaw
- anthropics released v2.1.80 at anthropics/claude-code
- zeroclaw-labs released v0.5.1-beta.403 at zeroclaw-labs/zeroclaw
- PrefectHQ released 3.6.23 at PrefectHQ/prefect
- bolucat released 202603192007 at bolucat/Archive
- zeroclaw-labs released v0.5.1-beta.390 at zeroclaw-labs/zeroclaw
- OpenAEV-Platform released 2.3.1 at OpenAEV-Platform/openaev
- 4ra1n starred jar-analyzer/jar-analyzer-engine
- 4ra1n made this repository public
- zeroclaw-labs released v0.5.1 at zeroclaw-labs/zeroclaw
- strands-agents released v1.31.0 at strands-agents/sdk-python
- github released v0.3.2 at github/spec-kit
- mgeeky starred Nova-Hunting/nova-rules
- Ridter starred mattpocock/skills
- ZeddYu starred rubickCenter/rubick
- gh0stkey starred justlovemaki/AIClient-2-API
- 4ra1n starred H4cking2theGate/AuditSkills
- 4ra1n forked 4ra1n/AuditSkills from H4cking2theGate/AuditSkills
- mgeeky starred galoryber/CodeSnag
- Verne in GitHub
- Tenable Blog
- 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
- Recent Commits to cve:main
- Microsoft Security Blog
- obaby 𝐢𝐧⃝ void
- 安全客-有思想的安全新媒体
- Insinuator.net
- Bug Bounty in InfoSec Write-ups on Medium
- Horizon3.ai
- Inside Stormshield
- Malware-Traffic-Analysis.net - Blog Entries
- Malwarebytes
- 奇客Solidot–传递最新科技情报
- 绿盟科技技术博客
- Offensive Security Blog: Latest Trends in Hacking | Praetorian
- 黑海洋Wiki | AI机器人硬件开发 | 网络安全攻防实战 | 区块链技术文档教程 - 免费资源平台
- 安全分析与研究
- 腾讯玄武实验室
- Huli's blog
- 黑鸟
- 虎符智库
- 威努特安全网络
- 代码卫士
- 看雪学苑
- CT Stack 安全社区
- 吾爱破解论坛
- 奇安信威胁情报中心
- 安全研究GoSSIP
- 信息安全国家工程研究中心
- 信安之路
- 安全学术圈
- 奇安信 CERT
- 天黑说嘿话
- 青藤云安全
- 中国信息安全
- 补天平台
- 安全圈
- 安全牛
- 中通安全应急响应中心
- 字节跳动安全中心
- 极客公园
- 阿里安全响应中心
- 嘶吼专业版
- 火绒安全
- 斗象智能安全
- 数世咨询
- 复旦白泽战队
- 软件安全与逆向分析
- 墨菲安全
- ChaMd5安全团队
- 情报分析师
- 美团技术团队
- TrustedSec
- 360数字安全
- 安全行者老霍
- 迪哥讲事
- 纽创信安
- IT Service Management News
- 安全419
- bellingcat
- ICT Security Magazine
- Securityinfo.it
- Over Security - Cybersecurity news aggregator
- Navia discloses data breach impacting 2.7 million people
- New ‘PolyShell’ flaw allows unauthenticated RCE on Magento e-stores
- You have to invite them in
- Iran-Aligned Militias Signal Expanded Regional Risk Amid US–Israel–Iran Conflict
- DarkSword, l’exploit kit che ha violato gli iPhone di mezzo mondo per rubare dati riservati
- US intel chiefs urge lawmakers to extend Section 702 surveillance power without changes
- Bitrefill blames North Korean Lazarus group for cyberattack
- New Android malware hiding in streaming apps to spy on users’ personal notes
- FBI seizes Handala data leak site after Stryker cyberattack
- FBI seizes pro-Iranian hacking group’s websites after destructive Stryker hack
- FBI, CISA warn on Microsoft Intune risks after Iran-linked cyberattack on Stryker
- La cybersecurity OT in Italia tra maturità limitata e pressioni normative
- White House pours cold water on cyber ‘letters of marque’ speculation
- Russian hackers exploit Zimbra flaw in Ukrainian govt attacks
- Risolto bug Bluetooth di Windows 11: cosa insegna sulla sicurezza del wireless aziendale
- Ransomware attack on UMMC: Medusa claims 1 TB of exfiltrated data as new details emerge
- 7 Ways to Prevent Privilege Escalation via Password Resets
- Interlock ransomware gang exploited Cisco firewall zero-day weeks before disclosure: Amazon
- Faraday bag, a cosa servono per la privacy e la sicurezza su smartphone (e a cosa no)
- Ready for macOS Threats: Expanding Your SOC’s Cross-Platform Analysis with ANY.RUN
- Max severity Ubiquiti UniFi flaw may allow account takeover
- Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency
- Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
- Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS
- Interlock Ransomware Leveraged Cisco FMC Zero-Day 36 Days Before Patch, Amazon Reveals
- CISA urges US orgs to secure Microsoft Intune systems after Stryker breach
- Oltre la trasmissione sicura: acceleratori crittografici per proteggere i dati in uso
- Inside Russia’s Shift to Credential-Based Intrusions: What CISOs Need to Know in 2026
- Critical Microsoft SharePoint flaw now exploited in attacks
- New ‘Perseus’ Android malware checks user notes for secrets
- China Sits at the Top of America’s Cyber Threat List
- Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
- Perseus: DTO malware that takes notes
- LLM in guerra: il Pentagono aprirà alle aziende la possibilità di training AI con dati riservati
- Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”
- Hasta la vista, Hastalamuerte: An Overview of The Gentlemen’s TTPs
- CISA Urges Endpoint Management Hardening After Stryker Cyberattack
- DarkSword: exploit chain iOS tra zero-day, spyware e cybercrime finanziario
- Future of Tech and Security: Strategy & Innovation with Raffy
- 360威胁情报中心
- Schneier on Security
- The Hacker News
- Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
- 54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
- ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
- New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
- How Ceros Gives Security Teams Visibility and Control in Claude Code
- DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
- CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
- SANS Internet Storm Center, InfoCON: green
- GRAHAM CLULEY
- Full Disclosure
- snap-confine + systemd-tmpfiles = root (CVE-2026-3888)
- APPLE-SA-03-17-2026-1 Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2
- SEC Consult SA-20260318-0 :: Multiple Privilege Escalation Vulnerabilities in Arturia Software Center MacOS
- SEC Consult SA-20260317-0 :: Multiple vulnerabilities in PEGA Infinity platform
- The Register - Security
- Security Affairs
- Critical Ubiquiti UniFi UniFi security flaw allows potential account hijacking
- U.S. CISA adds a flaw in Cisco FMC and Cisco SCC Firewall Management to its Known Exploited Vulnerabilities catalog
- Russian APT targets Ukraine via Zimbra XSS flaw CVE-2025-66376
- DarkSword emerges as powerful iOS exploit tool in global attacks
- Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure
- Russia establishes Vienna as key western spy hub targeting NATO
- DEFION Research Labs
- Ruckus Unleashed: Multiple vulnerabilities exploited
- Pwn2Own Automotive 2024: Hacking the Autel MaxiCharger
- Pwn2Own Automotive 2024: Hacking the JuiceBox 40
- Pwn2Own Automotive 2024: Hacking the ChargePoint Home Flex (and their cloud...)
- DoNex/DarkRace Ransomware Decryptor
- CVE-2024-20693: Windows cached code signature manipulation
- Bringing process injection into view(s): exploiting all macOS apps using nib files
- Don’t Talk All at Once! Elevating Privileges on macOS by Audit Token Spoofing
- Getting SYSTEM on Windows in style
- Technical analysis of the Genesis Market
- Bad things come in large packages: .pkg signature verification bypass on macOS
- Pwn2Own Miami 2022: ICONICS GENESIS64 Arbitrary Code Execution
- Pwn2Own Miami 2022: Unified Automation C++ Demo Server DoS
- Pwn2Own Miami 2022: AVEVA Edge Arbitrary Code Execution
- Process injection: breaking all macOS security layers with a single vulnerability
- Pwn2Own Miami 2022: Inductive Automation Ignition Remote Code Execution
- Pwn2Own Miami 2022: OPC UA .NET Standard Trusted Application Check Bypass
- CoronaCheck App TLS certificate vulnerabilities
- Sandbox escape + privilege escalation in StorePrivilegedTaskService
- Proctorio Chrome extension Universal Cross-Site Scripting
- Zoom RCE from Pwn2Own 2021
- Adobe Acrobat privilege escalation
- iOS VPN support: 3 different bugs
- Sign in with Apple - authentication bypass
- Jenkins - authentication bypass
- DNS rebinding for HTTPS
- Spring Security - insufficient cryptographic randomness
- XenServer - path traversal leading to authentication bypass
- Volkswagen Auto Group MIB infotainment system - unauthenticated remote code execution as root
- NAPALM - command execution on NAPLM controller from host
- MySQL Connector/J - Unexpected deserialisation of Java objects
- Ansible - command execution on Ansible controller from host
- Observium - unauthenticated remote code execution
- cSRP/srpforjava - obtaining of hashed passwords
- StartEncrypt - obtaining valid SSL certificates for unauthorized domains
- Security Weekly Podcast Network (Audio)
Reactions are currently unavailable