资讯

U.S. companies are using generative AI, raising concerns about data privacy, compliance, and operational risks.
The altered app packs in two extra executables within Termius Helper.app, a loader named ".localized" that's designed to ...
AMD reveals new Transient Scheduler vulnerabilities in CPUs, exposing sensitive data risks across multiple Ryzen and EPYC ...
ServiceNow's CVE-2025-3648 flaw exposes sensitive data across multiple tables, impacting all users with misconfigured ACLs.
Gold Melody uses ASP.NET vulnerabilities for long-term access, impacting various industries across Europe and the U.S.
The IT worker scheme, also tracked as Nickel Tapestry, Wagemole, and UNC5267, involves North Korean actors using a mix of ...
Anatsa banking malware targets North American users via Google Play, leading to credential theft and financial fraud ...
Hackers are exploiting Shellter’s leaked Elite license to distribute Lumma Stealer, SectopRAT, and more. This affects ...
"Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a ...
According to data compiled by Kaspersky, small- and medium-sized businesses (SMBs) are being increasingly targeted by cyber ...
Russian organizations have been targeted by Batavia spyware in a phishing attack, exfiltrating documents and system info.
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach ...