Ghostwire — Live Cybersecurity Feed

Real-time cybersecurity news from 130+ sources. Updated every 5 minutes.

FBI, CISA issue PSA on Russian intelligence campaign to target messaging apps

CyberScoop · Tim Starks · 2026-03-20 19:34 UTC

It echoes earlier alerts from the Netherlands and Germany, and is the latest to warn about targeting of Signal users and others. The post FBI, CISA issue PSA on Russian intelligence campaign to target...

CybersecurityCybersecurity and Infrastructure Security Agency (CISA)encrpytionFederal Bureau of Investigation (FBI)germany

California city reports ransomware attack as LA transit agency finds ‘unauthorized activity’

The Record · The Record · 2026-03-20 19:21 UTC

Foster City warned that it is possible the hackers obtained public information, urging anyone that has done business with the city to change personal passwords and take measures to protect personal da...

CybercrimeGovernmentNews

FBI warning to Google Chrome, Microsoft Edge and Apple’s Safari users: How hackers are stealing data and what you can do

Ransomware · 2026-03-20 18:44 UTC
Ransomware

Trio sentenced for facilitating North Korean IT worker scheme from their homes

CyberScoop · Matt Kapko · 2026-03-20 18:17 UTC

The men facilitated about $1.28 million in salary from victim U.S. companies by hosting laptop farms and helping remote IT workers assume fake identities. The post Trio sentenced for facilitating Nort...

CybersecurityThreatscybercrimeDepartment of Justice (DOJ)guilty

EU Belatedly Sanctions Chinese and Iranian Hackers

Bank Info Security · 2026-03-20 17:51 UTC
Bank Info Security

Simple Mario Game In PYTHON With Source Code

Source Code & Projects · Fabian Ros · 2026-03-20 17:48 UTC

Project: Simple Mario Game in Python with source code About Project This simple Mario Game project is written in Python. The […] The post Simple Mario Game In PYTHON With Source Code appear...

Python Projectspython

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

The Hacker News · Ravie Lakshmanan · 2026-03-20 17:47 UTC

Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to deliver malware that stole sensitive CI/CD secrets. The late...

FBI takes down leak sites tied to Iran’s Ministry of Intelligence and Security

The Record · The Record · 2026-03-20 17:21 UTC

In a 40-page seizure warrant, the FBI outlined multiple digital campaigns launched by Iran’s Ministry of Intelligence and Security (MOIS) through a variety of online monikers, most recently going by t...

CybercrimeGovernmentNewsNation-state

Hospital cyberattacks threaten patient safety

Healthcare Security · 2026-03-20 16:57 UTC
Healthcare Security

Fraud Alert: From e-Challan, Gas Bill Updates to APK Traps — How Malware Scams Are Draining Bank Accounts

Financial Security · 2026-03-20 16:54 UTC
Financial Security

Former hacker launches single all-in-one solution designed to prevent leading cause of data breaches

Hackers · 2026-03-20 16:37 UTC
Hackers

Cyber OpSec Fail: Beast Gang Exposes Ransomware Server

Dark Reading · Robert Lemos · 2026-03-20 16:31 UTC

Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.

Chrome Beta for Desktop Update

Google Chrome Releases · Ben Mason · 2026-03-20 16:28 UTC

The Beta channel has been updated to 147.0.7727.15 for Windows, Mac and Linux.A partial list of changes is available in the Git log. Interested in switching release channels? Find out how. If you find...

Cyber scammers refine phishing tactics with AI

Phishing · 2026-03-20 16:22 UTC
Phishing

Ubiquiti defect poses account takeover risk for UniFi Networking Application users

CyberScoop · Matt Kapko · 2026-03-20 16:22 UTC

The maximum-severity vulnerability, which hasn’t been exploited in the wild yet, affects software customers use to manage networking devices. The post Ubiquiti defect poses account takeover risk for U...

CybersecurityResearchTechnologyThreatsCensys

Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Cyber Attacks · 2026-03-20 16:19 UTC
Cyber Attacks

UK Cyber Monitoring Centre plans expansion in US amid risk of Category 5 attack

Computer Weekly · 2026-03-20 16:18 UTC
Computer Weekly

Millions of iPhones Exposed to New Hacking Tool Found in the Wild

State-Sponsored Cyber · 2026-03-20 16:01 UTC
State-Sponsored Cyber

Outsourcing Giant TELUS Digital Confirms Data Breach that Leaked Nearly a Petabyte

CPO Magazine · 2026-03-20 16:00 UTC
CPO Magazine

SecWiki News 2026-03-20 Review

SecWiki · SecWiki · 2026-03-20 15:58 UTC

算法战争:从美以对伊行动,看AI+情报的绝对价值 by ourrenDr. Claw: 面向科研全流程的通用 AI 研究助手 by ourren2025太空安全报告 by ourren从AIIDE的架构演进,洞察AI工程化的设计逻辑 by ourrenLearn Claude Code -- 真正的 Agent Harness 工程 by ourrenground-station:开源一...

Companies know AI is essential for cyber defense but aren’t yet seeing returns

Cybersecurity Dive · 2026-03-20 15:30 UTC
Cybersecurity Dive

伊朗动员穷人组织情报部门负责人身亡

Weibo Hot Search · Weibo · 2026-03-20 15:23 UTC

Weibo Hot Search · 85K views · new · +100% velocity

Weibo Hot SearchChina

Negotiating with the Board: Translating Active Risk into Financial Exposure

Rapid7 · Trevor Christiansen · 2026-03-20 15:18 UTC

Security leaders rarely struggle to produce data. The challenge is turning that data into something the board can use to make decisions.Walk into a board meeting with a slide showing 1,200 critical vu...

Vulnerability ManagementInsightVM

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

The Hacker News · Ravie Lakshmanan · 2026-03-20 15:15 UTC

A critical security flaw impacting Langflow has come under active exploitation within 20 hours of public disclosure, highlighting the speed at which threat actors weaponize newly published vulnerabili...

CISA orders feds to patch max-severity Cisco flaw by Sunday

Network Security · 2026-03-20 15:09 UTC
Network Security

We’re launching the Top Sports Podcasts on YouTube for brands to align with sports fans.

The Keyword · The Keyword · 2026-03-20 15:00 UTC

YouTube is where all sports come to life — because no sporting event or game would be complete without the commentary, breakdowns and analysis surrounding it. In 2025 al…

Google AdsYouTube

Rep. LaHood on why Section 702 reauthorization will take a ‘little political muscle’

The Record · The Record · 2026-03-20 14:45 UTC

Rep. Darin LaHood (R-IL) talked about recent issues that have cropped up around Section 702 and what needs to be done to get a renewal over the finish line.

GovernmentLeadershipInterviewsNewsPrivacy

How to Implement Dijkstra’s Shortest Path Algorithm in Python

SourceCodester - Visual Basic, VB.NET, C#, PHP/MySQL, C/C++, Java/JavaScript, ASP/ASP.NET, MS Access, FoxPro, SQL · razormist · 2026-03-20 14:32 UTC

How to Implement Dijkstra’s Shortest Path Algorithm in Python razormist Fri, 03/20/2026 - 22:32

US seizes domains and infrastructure used in sprawling botnet campaigns

The Record · The Record · 2026-03-20 14:25 UTC

The Justice Department said on Thursday evening that the Aisuru, KimWolf, JackSkid and Mossad botnets were used to target victims with distributed denial-of-service (DDoS) attacks that overloaded webs...

CybercrimeGovernmentNews

Perseus Malware Targets Android Users in Turkey and Italy

Malware · 2026-03-20 14:24 UTC
Malware

Justice Department disrupts botnet networks that hijacked 3 million devices

CyberScoop · Matt Kapko · 2026-03-20 14:19 UTC

The Aisuru, Kimwolf, JackSkid and Mossad botnets enabled cybercriminals to initiate thousands of attacks. A crackdown targeting large-scale botnets continues amid growing challenges. The post Justice ...

CybercrimeCybersecurityGovernmentResearchThreats

Does Internet Initiative Japan's (TSE:3774) New Safous Tool Clarify Its Cybersecurity Edge Or Stretch It?

Telecom Security · 2026-03-20 14:16 UTC
Telecom Security

US seizes Iran-linked sites amid cyber war

MSN Cyber · 2026-03-20 14:04 UTC
MSN Cyber

Man pleads guilty to $8 million AI-generated music scheme

The Record · The Record · 2026-03-20 13:57 UTC

Michael Smith, 54, admitted to inflating streaming numbers for hundreds of thousands of AI-generated songs by deploying thousands of fake accounts across major platforms, including Amazon Music, Apple...

CybercrimeNewsNews Briefs

Could your face change what you pay? NYC wants limits on biometric tracking

Malwarebytes Labs · Malwarebytes Labs · 2026-03-20 13:39 UTC

NYC lawmakers are pushing to rein in biometric tracking before it turns into real-world surveillance pricing and customer profiling.

NewsPrivacy biometrics surveillance pricing

Cisco FMC flaw was exploited by Interlock weeks before patch (CVE-2026-20131)

Help Net Security · Zeljka Zorz · 2026-03-20 13:21 UTC

A critical vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC) that Cisco disclosed and patched in early March 2026 has been exploited as a zero-day by the Interlock ransom...

Don't missHot stuffNews0-dayAWS

FundsTech 2026: Cybersecurity, quantum computing and the future of asset management

Quantum Threats · 2026-03-20 13:06 UTC
Quantum Threats

Interlock Ransomware Targets Cisco Enterprise Firewalls

Network Security · 2026-03-20 13:00 UTC
Network Security

The Good, the Bad and the Ugly in Cybersecurity – Week 12

SentinelOne · SentinelOne · 2026-03-20 13:00 UTC

Interpol disrupts cybercrime networks, DarkSword steals iOS personal data, and Interlock exploits Cisco 0-day to breach enterprise firewalls.

Companycybercyber newsweekly

CVE-2026-31381, CVE-2026-31382: Gainsight Assist Information Disclosure and Cross-Site Scripting (FIXED)

Rapid7 · Christopher O’Boyle · 2026-03-20 13:00 UTC

OverviewRapid7 Labs recently identified a chain of security vulnerabilities in the Gainsight Assist plugin and its interactions with the associated domain app.gainsight.com. These vulnerabilities incl...

ResearchVulnerability Disclosure

Interlock Ransomware Targets Cisco Enterprise Firewalls

Dark Reading · Alexander Culafi · 2026-03-20 13:00 UTC

The ransomware gang, known for double-extortion attacks, had access to a critical Cisco firewall vulnerability weeks before it was publicly disclosed.

HBO's Pitt Exposes Hospital Cyberattack Chaos

Healthcare Security · 2026-03-20 12:54 UTC
Healthcare Security

笔记本充满电关机,第二天打开电量总是掉到0%无法开机,求解决

52Pojie · vanapple1 · 2026-03-20 12:42 UTC
『悬赏问答区』

Google slows Android sideloading to trip up scammers

Help Net Security · Anamarija Pogorelec · 2026-03-20 12:37 UTC

Google’s advanced flow for Android changes how apps from unverified developers are installed, adding steps to reduce scam-driven sideloading. The feature is aimed at experienced users and allows sidel...

NewsAndroidapplication securityGooglescams

FBI Warns Tron Blockchain Users of Phishing Attack Using Fake Tokens Impersonating the Agency

Phishing · 2026-03-20 12:30 UTC
Phishing

North Korea’s Foreign Currency Revenues Hit Record High on Arms Sales to Russia and Cybercrime

DPRK Cyber · 2026-03-20 12:27 UTC
DPRK Cyber

Terminated contract led to $2.5 million cyber extortion scheme

Help Net Security · Sinisa Markovic · 2026-03-20 12:24 UTC

A federal jury convicted Cameron Curry, 27, a Charlotte resident, of carrying out an extensive cyber extortion scheme targeting a Washington, D.C.-based international technology company. He faces up t...

Newscybercrimeextortiongovernmentinsider threat

求分享最新的焊接工艺规范电子版

52Pojie · cwz66897 · 2026-03-20 12:22 UTC
『悬赏问答区』

求最新的低压电工的考试培训课程,带讲义的

52Pojie · jyx_2004 · 2026-03-20 12:18 UTC
『悬赏问答区』

Critical UNISOC T612 Modem Flaw Enables RCE via Cellular Calls

CyberPress · AnuPriya · 2026-03-20 12:09 UTC

A critical memory-corruption flaw in UNISOC’s T612 modem family allows remote code execution (RCE) on vulnerable Android devices using only a malicious cellular video call, enabling one phone to compr...

Cyber Security NewsCybersecurity

Russian Intelligence Services Target Commercial Messaging Application Accounts

CISA Advisories · CISA · 2026-03-20 12:00 UTC

CISA and the Federal Bureau of Investigation released a Public Service Announcement (PSA) warning about ongoing phishing campaigns cyber actors associated with the Russian Intelligence Services target...

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA Advisories · CISA · 2026-03-20 12:00 UTC

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-31277 Apple Multiple Products Buffer Overflow Vulnerab...

Fake Tools Fuel Vibe-Coded Malware Campaign Targeting Unsuspecting Users

CyberPress · Varshini · 2026-03-20 11:59 UTC

A large malware campaign is abusing fake software downloads to infect users with crypto miners, info-stealers, remote access tools, and other payloads. Researchers at McAfee Labs observed 443 maliciou...

cryptocurrencyCyber Security NewsMalware

Cobra DocGuard Hijacked By Speagle Malware For Sensitive Data Theft

CyberPress · Varshini · 2026-03-20 11:58 UTC

Symantec and Carbon Black researchers have discovered a stealthy new infostealer named Speagle. This malware hijacks Cobra DocGuard, a legitimate document security platform developed by the Chinese co...

APTCyber Security NewsMalware

千库网4个PPT模板下载

52Pojie · 迪卡凯恩 · 2026-03-20 11:48 UTC
『悬赏问答区』

ScreenConnect Deployed via SILENTCONNECT Using VBScript and PEB Masquerading

CyberPress · Varshini · 2026-03-20 11:40 UTC

A new malware campaign is using a stealthy loader called SILENTCONNECT to deploy remote access software on victim systems. Security researchers from Elastic Security Labs report that attackers are abu...

Cyber Security NewsMalware

That “job brief” on Google Forms could infect your device

Malwarebytes Labs · Malwarebytes Labs · 2026-03-20 11:38 UTC

Fake job offers on Google Forms are spreading PureHVNC malware that can take over your device.

ScamsThreat Intel

Russian APT Exploits Zimbra XSS In GhostMail Attacks On Ukrainian Government

CyberPress · Varshini · 2026-03-20 11:33 UTC

Seqrite Labs has uncovered a highly targeted phishing campaign dubbed “Operation GhostMail”. The attack compromised the Ukrainian State Hydrology Agency by exploiting a Cross-Site Scriptin...

APTCyber Security NewsXSS

Cybersecurity Trends 2026: Gartner Warns of AI Agents & Quantum Risks

Quantum Threats · 2026-03-20 11:22 UTC
Quantum Threats

FBI seizes Iranian hacker domains after Stryker attack

MSN Cyber · 2026-03-20 11:07 UTC
MSN Cyber

求一个快捷键播放语音到麦克风的软件

52Pojie · meiao123 · 2026-03-20 11:07 UTC
『悬赏问答区』

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

The Hacker News · Ravie Lakshmanan · 2026-03-20 10:57 UTC

Google on Thursday announced a new "advanced flow" for Android sideloading that requires a mandatory 24-hour wait period to install apps from unverified developers in an attempt to balance openness wi...

Rapid7 enhances Exposure Command with runtime validation and DSPM for risk analysis

Help Net Security · Industry News · 2026-03-20 10:50 UTC

Rapid7 has unveiled new cloud security capabilities within Exposure Command. The introduction of runtime validation and Data Security Posture Management (DSPM) enables organizations to identify, valid...

Industry newsRapid7RSAC 2026

Iran’s Stryker Hack

Real Clear Defense · 2026-03-20 10:41 UTC
Real Clear Defense

Popular AI girlfriend apps are unsafe: Hackers can read your intimate chats.

CyberNews · 2026-03-20 10:39 UTC
CyberNews

Authorities disrupt four IoT botnets behind record DDoS attacks

Help Net Security · Sinisa Markovic · 2026-03-20 10:38 UTC

The U.S. Justice Department and international partners have disrupted four IoT botnets linked to DDoS attacks that reached 30 terabits per second, among the largest ever recorded. The post Authorities...

NewsbotnetcybercrimegovernmentInternet of Things

黑白棋专业版2.0 - html原码

52Pojie · xhd335 · 2026-03-20 10:19 UTC
『编程语言区』

Fake AI songs streamed billions of times, netting fraudster $10 million

Help Net Security · Anamarija Pogorelec · 2026-03-20 10:17 UTC

Michael Smith, 54, of Cornelius, North Carolina, has pleaded guilty in federal court to running a scheme that exploited music streaming platforms and diverted royalty payments from artists. He admitte...

NewsArtificial intelligencebotcybercrimefraud

Cyber Insurance Market to Reach USD 118.97 Billion by 2032 Amid Rising Ransomware Risk, Regulatory Pressure, and AI-Driven Underwriting Innovation

Energy Security · 2026-03-20 10:14 UTC
Energy Security

FBI cracks down on Pro-Iranian hackers after Stryker cyberattacks

Salt Typhoon · 2026-03-20 10:13 UTC
Salt Typhoon

North Korea’s Foreign Currency Revenues Hit Record High on Arms Sales to Russia and Cybercrime

North Korea Cyber · 2026-03-20 10:10 UTC
North Korea Cyber

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

The Hacker News · Unknown · 2026-03-20 10:00 UTC

Artificial Intelligence (AI) is changing how individuals and organizations conduct many activities, including how cybercriminals carry out phishing attacks and iterate on malware. Now, cybercriminals ...

求下载csdn资料

52Pojie · mgsoft · 2026-03-20 09:52 UTC
『悬赏问答区』

求电子书凯心的《盘感系统-在速度维度里捕捉盘感的微光》

52Pojie · daoziduxia · 2026-03-20 09:47 UTC
『悬赏问答区』

CSDN下载

52Pojie · BilboBaggins · 2026-03-20 09:40 UTC

https://download.csdn.net/download/weixin_42621710/86262974 求下载里面说明的 drawintl.dll 文件,多谢大佬!

『悬赏问答区』

NCA Boss Warns That Teens Are Being “Radicalized” Into Cybercrime Online

Infosecurity Magazine · Infosecurity Magazine · 2026-03-20 09:40 UTC

The National Crime Agency’s director general warns that technology is rapidly reshaping crime

江苏移动版TP-LINK WMA301 V6.0版本路由器固件

52Pojie · dongzili · 2026-03-20 09:39 UTC
『悬赏问答区』

Unpatched ScreenConnect servers open to attack (CVE-2026-3564)

Help Net Security · Zeljka Zorz · 2026-03-20 09:37 UTC

ConnectWise has patched a critical vulnerability (CVE-2026-3564) that could enable attackers to hijack ScreenConnect sessions by abusing ASP.NET machine keys to forge trusted authentication. About CVE...

Don't missHot stuffNewsConnectWiseMSP

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

The Hacker News · Ravie Lakshmanan · 2026-03-20 09:30 UTC

Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover. The vuln...

Миллион за сисадмина: как один айтишник может остановить компанию на неделю

Habr InfoSec · alp-itsm (ALP ITSM) · 2026-03-20 09:23 UTC

Эта статья для собственников и директоров малого и среднего бизнеса, у которых в компании есть один ИТ-специалист или ИТ-лидер, отвечающий за все разом. Если сейчас уход такого человека — это катастро...

управление людьмиуправление персоналомбезопасностьдокументирование

本地覆盖之后不用覆盖后的文件了怎么办?

52Pojie · lenxueyan · 2026-03-20 09:12 UTC

反调试-打开控制台,自动关闭页面。 大佬们,这种怎么解决啊。没本地覆盖之前,用的是正常的main.js,本地覆盖之后,直接不用了,变成用虚拟机里的了。 图片

『脱壳破解讨论求助区』

Critical Bamboo Data Center Vulnerability Enables Remote Code Execution

Supply Chain · 2026-03-20 09:06 UTC
Supply Chain

America Must Fight China's All-Out Cyber Warfare

Volt Typhoon · 2026-03-20 09:06 UTC
Volt Typhoon

Critical Bamboo Data Center Vulnerability Enables Remote Code Execution

CyberPress · AnuPriya · 2026-03-20 09:06 UTC

Atlassian has patched a high-severity remote code execution (RCE) vulnerability in its Bamboo Data Center platform, a widely used continuous integration and continuous deployment (CI/CD) solution. Tra...

Cyber Security NewsCybersecurityVulnerability

直播聚合工具 - 观潮台v1.0 Guanchaotaiv1.0

52Pojie · DowJones · 2026-03-20 09:00 UTC

苦于没有直播聚合软件,上班都无法摸!看了一下github上的Simple Live,感觉也不好用,于是自己用AI辅助写了一个直播聚合软件。 我个人用了一周有余了,还是很方便的,所以分享给大家,希望有需要的人能用得上。 软件 ...

『精品软件区』

道客巴巴文档下载

52Pojie · 好的老头 · 2026-03-20 08:53 UTC
『悬赏问答区』

DarkSword: The iPhone Hack That Can Silently Steal Everything From Millions of Devices

State-Sponsored Cyber · 2026-03-20 08:52 UTC
State-Sponsored Cyber

求字体

52Pojie · 52Pojie · 2026-03-20 08:50 UTC
『悬赏问答区』

求软考高级【系统分析师的学习备考资料】,要最新版本的(2025-2026),谢谢

52Pojie · wohooMk · 2026-03-20 08:49 UTC
『悬赏问答区』

‘Perseus’ Malware Hits Android Users Via Fake IPTV Apps

WION News · 2026-03-20 08:45 UTC
WION News

GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)

SANS ISC · SANS ISC · 2026-03-20 08:40 UTC

Yesterday, I discovered a malicious Bash script that installs a GSocket backdoor on the victim&#x27s computer. I don&#x27t know the source of the script not how it is delivered to the victim.

百度文库求下载

52Pojie · 52504478lc · 2026-03-20 08:29 UTC

https://wenku.baidu.com/view/ee3cbd237a563c1ec5da50e2524de518964bd3e1.html?_wkts_=1773994149389&bdQuery=%E7%A0%94%E7%A9%B6%E5%BC%80%E5%8F%91%E7%9A%84%E7%BB%84%E7%BB%87%E7%AE%A1%E7%90%86%E5%88%B6%E5%BA...

『悬赏问答区』

csdn帮忙转存

52Pojie · Lion0818 · 2026-03-20 08:19 UTC

https://blog.csdn.net/reset2021/article/details/158967082

『悬赏问答区』

Pyronut Package Found Backdooring Telegram Bots For Remote Code Execution

CyberPress · Varshini · 2026-03-20 08:15 UTC

A sophisticated supply chain attack recently targeted Telegram bot developers through a malicious Python package named “pyronut,” which impersonated the legitimate “pyrogram” A...

Cyber Security NewsPythonTelegram

定向感谢贴

52Pojie · px307 · 2026-03-20 08:11 UTC

非常感谢 @sexsexy 帮忙下载一个大文件 , 一点CB,请笑纳 原贴 https://www.52pojie.cn/forum.php?mod=redirect&goto=findpost&ptid=2097775&pid=54994968

『悬赏问答区』

Fraudsters defrauded EU citizens of €300,000 in a call center scheme with "drops"; they were exposed as part of an international cyber operation

UNN · 2026-03-20 08:02 UTC
UNN

文件和文件夹批量重命名工具 OncePower v3.0.0

52Pojie · naixubao · 2026-03-20 08:00 UTC

一、发布原因:由于前面大佬发布的主题自动关闭,不再接受新的回复,故更新新版本需要重新开帖。[hr] 二、工具简介:OncePower 是一款开源免费、绿色便携、跨平台的文件 / 文件夹批量重命名工具,主打无需正则、可视化操 ...

『精品软件区』

Semgrep Multimodal brings AI reasoning and rule-based analysis to code security

Help Net Security · Industry News · 2026-03-20 07:47 UTC

Semgrep announced Semgrep Multimodal, a system that combines AI reasoning with rule-based analysis for detection, triage, and remediation. Its detection finds up to 8x more true positives while cuttin...

Industry newsSemgrep

ConductorOne unveils AI Access Management to accelerate secure, compliant AI adoption

Help Net Security · Industry News · 2026-03-20 07:39 UTC

ConductorOne has announced its AI Access Management product extension, a unified control plane for managing access to AI tools, agents, and MCP connections across the enterprise. The platform enables ...

Industry newsConductorOne

求2026一级建造师夸克网盘,及时更新的

52Pojie · PoetQiu · 2026-03-20 07:31 UTC
『悬赏问答区』

Bonfy ACS 2.0 helps organizations control data use in AI environments

Help Net Security · Industry News · 2026-03-20 07:28 UTC

Bonfy.AI announced Bonfy Adaptive Content Security (Bonfy ACS) 2.0, a platform built to secure enterprise content across all systems, applications, and AI agents – anywhere data moves, resides, ...

Industry newsBonfy.AIRSAC 2026

Polus-24 and Military Unit 33949: documents obtained by cyber specialists lead to the Russian strategic nuclear forces.

Ukraine Conflict · 2026-03-20 07:26 UTC
Ukraine Conflict

香港游客入住深圳酒店会做反偷拍探测

4Hou · RC2反窃密实验室 · 2026-03-20 07:20 UTC

据港媒《Sing Tao Probe》(星岛探知)报道,鉴于客房内偷拍事件呈上升趋势,深圳各大酒店已开始实施更为严格的监控与防范措施。据报道,中国内地多地均接连发生酒店客房内被安装偷拍设备的事件。部分住客在毫不知情的情况下遭到偷拍,相关偷拍视频随后被非法贩卖至网络平台。据境外媒体披露,目前据信已有超过180家酒店被发现存在偷拍设备。在其中一起案件中,一对入住深圳某酒店的香港情侣遭到偷拍,相关视频随...

Meta AI agent’s instruction causes large sensitive data leak to employees

Data Breach · 2026-03-20 07:03 UTC
Data Breach

Разбираем net/http на практике. Часть 2.2: Архитектура и безопасность. Внедряем Clean Architecture, хэшируем пароли

Habr InfoSec · Meedoeed · 2026-03-20 07:00 UTC

Продолжаем писать сервис DeadDrop: сегодня идём от монолита к чистой архитектуреВ предыдущей части мы реализовали готовый прототип, но его код был спорным: от смешанной логики до хранения секретов пол...

gogolangbackendбэкендвеб-разработка

手机取证不用人?L4级全自动化取证来了!

4Hou · 国投智能 · 2026-03-20 06:28 UTC

3月18日上午,国投智能股份“稳进拓远 数创新境”2026年第一季度第二期产品发布会在厦门总部数字立方大厦举行。本次发布会聚焦人工智能技术与电子数据取证领域的深度融合,展现进入L4级自动化取证时代的最新成果,发布多款创新产品——美亚风鸟、手机智能自动化取证方舱、智问系统·系列产品。发布会现场国投智能股份首席技术官吴鸿伟致辞,他表示2026年是“十五五”开局之年,也是公司以产品为核心,稳固传统行业龙...

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

The Hacker News · Ravie Lakshmanan · 2026-03-20 06:25 UTC

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, an...

New Critical Jenkins Vulnerabilities Put CI/CD Servers at Risk of RCE Exploits

GBHackers · GBHackers · 2026-03-20 06:24 UTC

The Jenkins project released a critical security advisory addressing multiple vulnerabilities in its core automation server and the LoadNinja plugin. These flaws expose continuous integration and cont...

CVE/vulnerabilityCyber Security NewsVulnerabilities

Как безопасно хранить и открывать пользовательские файлы локально в Android

Habr InfoSec · Evolinc (Альфа-Банк) · 2026-03-20 06:12 UTC

Приходилось ли вам браться за задачу, из-за которой прошлый разработчик успел выгореть и сменить компанию? Что ж, мне удалось с такой столкнуться — c задачей обеспечения безопасного локального хранени...

android securityappsec

Navia Confirms Data Breach Exposing Sensitive Information of 2.7 Million Users

GBHackers · GBHackers · 2026-03-20 06:03 UTC

Navia Benefit Solutions has confirmed a significant data breach impacting nearly 2.7 million individuals. The incident resulted from unauthorised access to the company’s systems, exposing sensit...

Cyber Security NewsData Breach

Microsoft Introduces Teams Upgrades to Improve Windows App Performance on ioS and Android

GBHackers · GBHackers · 2026-03-20 05:48 UTC

Microsoft has officially announced the general availability of new Microsoft Teams optimizations designed specifically for the Windows App on both iOS and Android operating systems. This important upd...

AndroidCyber Security NewsiOSMicrosoft

Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks

The Hacker News · Ravie Lakshmanan · 2026-03-20 05:16 UTC

Apple is urging users who are still running an outdated version of iOS to update their iPhones to secure against web-based attacks carried out via powerful exploit kits like Coruna and DarkSword. Thes...

TraceBack Box Writeup From HTB DOT EU

InfoSec Write-ups · Cyb0rgBytes · 2026-03-20 05:11 UTC
ctf-writeupcybersecurityhackingctftechnology

How to Write a Vulnerability Report That Gets Paid -Not Rejected

InfoSec Write-ups · Hacker MD · 2026-03-20 05:10 UTC
infoseccybersecuritypenetration-testingbug-bountyethical-hacking

ATT&CK as a Working Tool: Theory and Hands-On Practical Usage

InfoSec Write-ups · Andrey Pautov · 2026-03-20 05:08 UTC

A practitioner’s guide for CTI analysts, detection engineers, and threat huntersContinue reading on InfoSec Write-ups »

cybersecuritymitre-attackaiinformation-securitycyber-threat-intelligence

How I Found a $1,000 Signature Replay Vulnerability in a Blockchain Bridge SDK

InfoSec Write-ups · Hacker MD · 2026-03-20 05:08 UTC
bug-bountyweb3-securitydefi-securityethical-hackingblockchain

The Art of Self-Healing Code: Malware that fixes itself

InfoSec Write-ups · Anmol Singh Yadav · 2026-03-20 05:07 UTC

Discover how self-healing malware evades detection, repairs itself, and persists using mutation engines, polymorphism, and process…Continue reading on InfoSec Write-ups »

cybersecurityprogramminginformation-securitymalwarehacking

Hunting in the Dark Forest: How I Uncovered a Private $25M Simulation Fork via an RPC…

InfoSec Write-ups · Hacker MD · 2026-03-20 05:07 UTC
ethereumethical-hackingweb3bug-bountycybersecurity

How to Set Up a Bug Bounty Recon Automation with Python & Nuclei

InfoSec Write-ups · Hacker MD · 2026-03-20 05:07 UTC
pythonethical-hackingbug-bountynucleuscybersecurity

Ghost Tom Box on TryHackMe.com

InfoSec Write-ups · Cyb0rgBytes · 2026-03-20 05:06 UTC
hackingcybersecuritywriteuptryhackme-walkthroughtryhackme

NTLM Is Dead. Your Password Hash Isn’t: Abusing SamrSetInformationUser in Active Directory

InfoSec Write-ups · A Belous · 2026-03-20 05:06 UTC
securitywindowsactive-directoryauthenticationcybersecurity

Четыре миллиарда лет R&D: что биология говорит об архитектуре NGFW

Habr InfoSec · Ideco (Ideco) · 2026-03-20 05:00 UTC

Попытка посмотреть на архитектуру систем сетевой безопасности через призму 4 млрд лет эволюционных экспериментов от директора компании Дмитрия Хомутова. Читать далее

ngfwidecoipsdpivpp

仿冒谷歌账号钓鱼攻击:利用恶意PWA应用窃取验证码、加密货币钱包

4Hou · 胡金鱼 · 2026-03-20 04:01 UTC

一场网络钓鱼活动正通过伪造谷歌账号安全页面,分发一款网页应用,该应用可窃取一次性验证码、采集加密货币钱包地址,并通过受害者浏览器转发攻击者流量。此次攻击利用渐进式Web应用(PWA)特性与社会工程学手段,诱骗用户以为自己正在与合法的谷歌安全页面交互,从而在不知情中安装恶意程序。 PWA可在浏览器中运行,并能像独立桌面应用一样从网页直接安装,运行时独立成窗,不显示常规浏览器控件。 受害者浏览器沦为攻...

嘶吼安全动态|马自达系统遭入侵,员工信息或泄露 Perseus安卓银行木马出现升级版

4Hou · 山卡拉 · 2026-03-20 04:00 UTC

嘶吼安全动态【国内新闻】马自达系统遭入侵,员工信息或泄露摘要:马自达披露其供应链管理系统遭未经授权访问,部分员工及合作方个人信息可能泄露,公司已启动调查并加强防护。原文链接:http://finance.sina.com.cn/roll/2026-03-19/doc-inhrnzrr6851886.shtml暗网犯罪风险再被强调 摘要:有媒体指出暗网正被境外情报与犯罪组织利用,成为数据交易与攻击策...

ISC Stormcast For Friday, March 20th, 2026 https://isc.sans.edu/podcastdetail/9858, (Fri, Mar 20th)

SANS ISC · SANS ISC · 2026-03-20 02:00 UTC

North Carolina tech worker found guilty of insider attack netting $2.5M ransom

CyberScoop · Matt Kapko · 2026-03-20 01:46 UTC

Cameron Nicholas Curry, also known as “Loot,” stole a trove of corporate data from a D.C.-based tech company as his six-month contract gig came to a close. The post North Carolina tech worker found gu...

CybercrimeCybersecuritycybercrimedata breachesdata theft

Police dismantle dark web network exploiting child sexual abuse material

The Record · The Record · 2026-03-20 00:00 UTC

International law enforcement agencies announced Friday dismantling one of the largest known networks of fraudulent platforms on the dark web, uncovering hundreds of thousands of fake websites used to...

Cybercrime

The Next Era of AppSec: Why AI-Generated Code Needs Offensive Dynamic Testing

Snyk · Snyk · 2026-03-20 00:00 UTC

Static analysis tells you what might be vulnerable, but dynamic testing tells you what is actually exploitable. Learn why the next era of AppSec requires combining code-level context with live environ...

Pivoting и tunneling в Active Directory: как это видит Blue Team

Codeby · Luxkerr · 2026-03-19 22:28 UTC

AI Conundrum: Why MCP Security Can't Be Patched Away

Dark Reading · Jai Vijayan · 2026-03-19 21:54 UTC

RSAC Conference Preview: MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says.

EU lawmakers must act now to ensure the continued protection of children

The Keyword · The Keyword · 2026-03-19 21:30 UTC

As technology companies, we are deeply concerned about the breakdown in EU negotiations to secure the continued protection of minors against child sexual abuse. Allowing…

Public PolicyFamiliesGoogle in Europe

Can Zero Trust survive the AI era?

CyberScoop · djohnson · 2026-03-19 21:06 UTC

As AI increases the speed of cyber attacks, governments and businesses must weigh the tradeoffs that come with deploying semi-autonomous AI agents to stop them. The post Can Zero Trust survive the AI ...

AICybersecurityGovernmentGAOArtificial Intelligence (AI)

With Government's Role Uncertain, Businesses Unite to Combat Fraud

Dark Reading · Arielle Waldman · 2026-03-19 20:43 UTC

Major industry leaders agree to share information and collaborate to boost defenses in the wake of distressing online scams.

Native Launches With Security Control Plane for Multicloud

Dark Reading · Dark Reading Staff · 2026-03-19 20:08 UTC

The cloud security startup's platform translates and enforces security policies across AWS, Azure, Google Cloud, and Oracle using provider-native controls.

[Перевод] Easy-RSA 3 и Public Key Infrastructure (PKI)

Habr InfoSec · denis_tunin · 2026-03-19 19:01 UTC

Утилита Easy-RSA изначально была создана в рамках проекта OpenVPN для упрощения управления ключами и сертификатами Инфраструктуры открытого ключа, использующимися для защиты передаваемой по сети инфор...

ssltlseasy-rsaopenvpnpki

54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security

The Hacker News · Ravie Lakshmanan · 2026-03-19 18:52 UTC

A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 35 vulnerable ...

Держим руку на пульсе: мониторинг состояния Wazuh

Habr InfoSec · Andrey_Biryukov (OTUS) · 2026-03-19 18:20 UTC

Как известно, SIEM системы предназначены для обнаружения угроз и мониторинга безопасности, но при этом важно учитывать, что и сама SIEM является сложной распределенной системой, с которой также могут ...

wazuhsiemинформационная безопасностьwazuh-managerelasticsearch

Post-Quantum Web Could be Safer, Faster

Dark Reading · Robert Lemos · 2026-03-19 18:19 UTC

Major providers are testing a quantum-safe version of HTTPS that shrinks certificates to one-tenth their previous size, decreasing latency and adding transparency.

Атаки на XML-структуры: XPath Injection и XXE на практике

Codeby · xzotique · 2026-03-19 17:03 UTC

科技云报到:“龙虾”OpenClaw狂欢之下,需要一针清醒剂

AnQuanKe · 科技云报到 · 2026-03-19 16:04 UTC

瑞数信息入选IDC两大AI安全报告,防御OpenClaw小龙虾裸奔危机

AnQuanKe · 科技云报到 · 2026-03-19 16:04 UTC

Ransomware Affiliate Exposes Details of 'The Gentlemen' Operation

Infosecurity Magazine · Infosecurity Magazine · 2026-03-19 16:00 UTC

Hastalamuerte leaks The Gentlemen RaaS ops: FortiGate exploits, BYOVD evasion, Qilin split tactics

How we’re helping you avoid scams this tax season

The Keyword · The Keyword · 2026-03-19 16:00 UTC

Google is sharing five ways it’s helping to protect you from scammers this tax season.

Safety & Security

Our new study explores how AI can reduce the climate impact of air travel.

The Keyword · The Keyword · 2026-03-19 16:00 UTC

Our new study shows what happens when contrail avoidance is built directly into the tools airlines already use.

Google Research

Five strategies for deeper AI adoption at work

The Keyword · The Keyword · 2026-03-19 16:00 UTC

A look at what Google learned when it collaborated with Stanford researchers to find out why some people adopt AI, and some don’t.

Life at Google

Crypto group ushers in post-quantum security

ReversingLabs · John P. Mello Jr. · 2026-03-19 15:00 UTC

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

Security Operations

Now anyone can host a global AI challenge

The Keyword · The Keyword · 2026-03-19 15:00 UTC

Kaggle Community Hackathons enable people to to create their own hackathons with prizes up to $10,000.

Developer tools

Football Scoreboard System In JavaScript With Source Code

Source Code & Projects · Fabian Ros · 2026-03-19 14:30 UTC

Project: Football Scoreboard System in JavaScript with source code Football Scoreboard System is developed using HTML, CSS, and JavaScript. Talking […] The post Football Scoreboard System In Jav...

JavaScript ProjectscssHTMLjavascript

Financial Brands Targeted in Global Mobile Banking Malware Surge

Infosecurity Magazine · Infosecurity Magazine · 2026-03-19 14:30 UTC

Mobile banking malware targets over 1200 financial apps globally, shifting fraud to user devices

ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

The Hacker News · Ravie Lakshmanan · 2026-03-19 14:25 UTC

ThreatsDay Bulletin is back on The Hacker News, and this week feels off in a familiar way. Nothing loud, nothing breaking everything at once. Just a lot of small things that shouldn’t work anymo...

CISO Whisperer Names 11 Vendors Leading the Shift from Tools to Outcomes at RSA Conference 2026

GBHackers · GBHackers · 2026-03-19 14:06 UTC

Austin, United States, March 19th, 2026, CyberNewswire Cybersecurity has entered a new phase, one defined less by reactive controls and more by continuous, intelligence-driven operations. As attack su...

Press Release

AI shopping gets simpler with Universal Commerce Protocol updates

The Keyword · The Keyword · 2026-03-19 14:00 UTC

Universal Commerce Protocol (UCP) releases new capabilities, and Google shares a new onboarding experience to simplify UCP integration.

ShoppingGoogle Ads

CISA Calls on Organizations to Strengthen Microsoft Intune Security After Stryker Incident

GBHackers · GBHackers · 2026-03-19 13:04 UTC

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert calling on organizations to aggressively harden their endpoint management systems. Released on March 18, 2026, th...

Cyber Security NewsMicrosoftVulnerabilities

A new milestone for smart, affordable electricity growth

The Keyword · The Keyword · 2026-03-19 13:00 UTC

We’ve signed 1 GW of data center demand response with utility partners, supporting smart, affordable electricity growth.

Global Network

Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirects

CyberPress · AnuPriya · 2026-03-19 12:51 UTC

Security researchers have disclosed a critical multi-stage attack chain affecting Anthropic’s Claude.ai platform, demonstrating how attackers can silently extract sensitive user data and redirect vict...

Cyber Security NewsCybersecurityVulnerability

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

The Hacker News · Ravie Lakshmanan · 2026-03-19 12:43 UTC

Cybersecurity researchers have disclosed a new Android malware family called Perseus that's being actively distributed in the wild with an aim to conduct device takeover (DTO) and financial fraud. Per...

伊朗要求阿联酋作出赔偿

Weibo Hot Search · Weibo · 2026-03-19 12:31 UTC

Weibo Hot Search · 90K views · new · +100% velocity

Weibo Hot SearchChina

Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency

The Record · The Record · 2026-03-19 12:30 UTC

The Russian state-backed hacker group APT28 targeted a Ukrainian government agency by exploiting a vulnerability in Zimbra webmail software.

NewsNews BriefsNation-state

Hackers Exploit OpenWebUI Servers to Deploy AI-Powered Payloads

CyberPress · AnuPriya · 2026-03-19 12:24 UTC

Hackers are abusing misconfigured OpenWebUI servers to deploy AI-generated payloads that mine cryptocurrency and steal credentials across Linux and Windows environments, while hiding their activity wi...

Cyber Security NewsCybersecurityHacksVulnerability

New SnappyClient Implant Enables Remote Access, Data Theft, and Stealth

CyberPress · Varshini · 2026-03-19 12:19 UTC

In December 2025, security researchers at Zscaler ThreatLabz discovered a new command-and-control (C2) framework implant named SnappyClient. Attackers deliver this malicious tool using the known Hijac...

Cyber Security NewsMalware

WaterPlum Launches New StoatWaffle Malware via VSCode-Themed Attack

CyberPress · Varshini · 2026-03-19 12:18 UTC

North Korea-linked threat actor WaterPlum has introduced a highly evasive new malware strain called StoatWaffle. Operating under the well-known “Contagious Interview” campaign, a specific ...

APTCyber Security NewsMalware

2026首届汽车安全白帽黑客大会圆满收官,共筑车联网安全新生态

AnQuanKe · 泽鹿安全 · 2026-03-19 12:15 UTC

Fake Tools and CDNs Power New “Vibe-Coded” Malware Campaign

GBHackers · GBHackers · 2026-03-19 12:07 UTC

‘Vibe coding’ has moved from buzzword to battleground, and a new malware campaign shows how attackers are abusing AI-assisted development to scale their operations with minimal effort. Vibe coding, a ...

cyber securityCyber Security NewsMalware

Schneider Electric Modicon Controllers M241, M251, M258, and LMC058

CISA Advisories · CISA · 2026-03-19 12:00 UTC

View CSAF Summary Successful exploitation of this vulnerability may risk a Cross-site Scripting or an open redirect attack which could result in an account takeover scenario or the execution of code i...

IGL-Technologies eParking.fi

CISA Advisories · CISA · 2026-03-19 12:00 UTC

View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services thr...

Automated Logic WebCTRL Premium Server

CISA Advisories · CISA · 2026-03-19 12:00 UTC

View CSAF Summary Successful exploitation of these vulnerabilities could allow an attacker to read, intercept, or modify communications. The following versions of Automated Logic WebCTRL Premium Serve...

Schneider Electric EcoStruxure Automation Expert

CISA Advisories · CISA · 2026-03-19 12:00 UTC

View CSAF Summary Schneider Electric is aware of a vulnerability in its EcoStruxure™ Automation Expert product. The EcoStruxure™ Automation Expert product is plant automation software designed for dig...

Mitsubishi Electric CNC Series

CISA Advisories · CISA · 2026-03-19 12:00 UTC

View CSAF Summary Successful exploitation of this vulnerability could allow a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition in the affected products. The f...

CTEK Chargeportal

CISA Advisories · CISA · 2026-03-19 12:00 UTC

View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services thr...

BYOVD-атаки на ядро Windows через драйверы: разбираю механику, воспроизвожу, строю защиту

Habr InfoSec · Goodex (Альфа-Банк) · 2026-03-19 11:37 UTC

Вы настроили Sysmon, у вас работает EDR, события летят в SIEM. Создаётся процесс, вы видите Event ID 1. Загружается DLL, Event ID 7. Всё под контролем. А теперь кто-то загружает в систему один .sys-фа...

BYOVDEDRWindows kernelSysmonSIEM

Your tax forms sell for $20 on the dark web

Malwarebytes Labs · Malwarebytes Labs · 2026-03-19 11:33 UTC

Tax season is also peak season for identity theft. Malwarebytes researchers spotted criminals trading stolen tax records on dark web forums.

PrivacyThreat Intel Dark Web

How Ceros Gives Security Teams Visibility and Control in Claude Code

The Hacker News · Unknown · 2026-03-19 10:58 UTC

Security teams have spent years building identity and access controls for human users and service accounts. But a new category of actor has quietly entered most enterprise environments, and it operate...

FCA Updates Cyber Incident and Third-Party Reporting Rules

Infosecurity Magazine · Infosecurity Magazine · 2026-03-19 10:30 UTC

The UK’s financial regulator has issued new rules to make incident and third-party reporting clearer

Pyronut Package Backdoors Telegram Bots With RCE

GBHackers · GBHackers · 2026-03-19 10:07 UTC

Malicious ‘Pyronut’ is a trojanized Python package that backdoors Telegram bots and userbots, giving attackers remote code execution over both the Telegram session and the underlying host system.​ The...

cyber securityCyber Security NewsTelegram

10 фактов об утечках данных в России за 2025 год

Habr InfoSec · SearchInform_team (SearchInform) · 2026-03-19 10:02 UTC

«СёрчИнформ» девятый год подряд проводит исследование уровня информационной безопасности в российских компаниях. Мы опросили 1150 руководителей и специалистов ИБ-подразделений из коммерческого и госуд...

исследование рынкастатистикасерчинформ киб

Analyzing the Current State of AI Use in Malware

Unit42 · Unit 42 · 2026-03-19 10:00 UTC

Unit 42 research explores how AI is currently used in malware, from superficial integrations to advanced decision-making, and its future impact. The post Analyzing the Current State of AI Use in Malw...

MalwareThreat Research.NETChatGPTGenAI

CISA Warns of Actively Exploited Zimbra Collaboration Suite Vulnerability

CyberPress · AnuPriya · 2026-03-19 09:58 UTC

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting the Zimbra Collaboration Suite (ZCS) to its Known Exploited Vulnerabilities (KEV) catalog,...

Cyber Security NewsCybersecurityVulnerability

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

Infosecurity Magazine · Infosecurity Magazine · 2026-03-19 09:50 UTC

Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says

Aura Confirms Data Breach Impacting 900,000 Customer Records

CyberPress · AnuPriya · 2026-03-19 09:44 UTC

Aura, a digital security provider, has confirmed a data breach impacting approximately 900,000 user records following a targeted social engineering attack. The incident underscores the growing effecti...

Cyber Security NewsCybersecurityData Breach

Horabot Returns in Mexico, Spreading via Phishing and Email Worm Attacks

GBHackers · GBHackers · 2026-03-19 09:42 UTC

Horabot has resurfaced in Mexico with a more complex, multi‑stage kill chain that blends fake CAPTCHA lures, living-off-the-land scripting, and an email worm‑style spreader to deliver a Latin American...

cyber securityCyber Security NewsPhishing

百度网盘转夸克

52Pojie · zhanghao20 · 2026-03-19 09:29 UTC
『悬赏问答区』

科锐41期课件作业和笔记

52Pojie · wxslaoli · 2026-03-19 09:26 UTC
『悬赏问答区』

VueScan Pro(专业扫描工具) v9.8.52.13

52Pojie · sdtax · 2026-03-19 09:23 UTC

VueScan是著名的第三方底片扫描仪驱动程序,支持市场可见绝大多数型号的底片扫描仪,可以更为灵活地控制扫描过程,更深入地发掘硬件潜力,获取色彩 完美的高质量扫描结果。VueScan支持200种以上的底片类型,在剪 ...

『精品软件区』

ScreenConnect Flaw Lets Hackers Steal Machine Keys and Hijack Sessions

CyberPress · AnuPriya · 2026-03-19 09:15 UTC

ConnectWise has issued a critical security update for its ScreenConnect remote desktop software after discovering a high-severity vulnerability that enables attackers to extract machine-level cryptogr...

Cyber Security NewsCybersecurityHacks

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover

The Hacker News · Ravie Lakshmanan · 2026-03-19 09:14 UTC

A new exploit kit for Apple iOS devices designed to steal sensitive data from is being wielded by multiple threat actors since at least November 2025, according to reports from Google Threat Intellige...

UK: Regulation Drives Cyber Spending for Critical Infrastructure Orgs

Infosecurity Magazine · Infosecurity Magazine · 2026-03-19 09:00 UTC

35% of security leaders working in the UK’s critical infrastructure said regulatory requirements are the primary influence on their security programs

New iOS Exploit Uses Advanced iPhone Hacking Tools to Steal User Data

CyberPress · AnuPriya · 2026-03-19 08:43 UTC

Google Threat Intelligence Group (GTIG) has uncovered a highly sophisticated full-chain iOS exploit dubbed “DarkSword,” actively targeting Apple users since November 2025. The exploit chain leverages ...

Cyber Security NewsCybersecurityVulnerability

求一个电竞陪玩接单系统

52Pojie · LivelyXuan · 2026-03-19 08:36 UTC
『悬赏问答区』

Облачная безопасность в 2026 году: три критических направления, с которыми не справиться «вчерашними» инструментами

Habr InfoSec · Cloud4Y (Cloud4Y) · 2026-03-19 08:35 UTC

К 2026 году стало очевидно: классические подходы к защите информационных систем перестали работать не потому, что «появилось больше уязвимостей», а потому что изменилась сама природа инфраструктуры и ...

cloud securityIAMzero trustцепочка поставокSBOM

AutoClick自动点击器v1.4.9官方便携版

52Pojie · snowcatflyer · 2026-03-19 08:33 UTC

如有侵权,请版主删帖。 如果不符发布区规则,麻烦请告知。 已查论坛暂无1.4.9版本 使用须知: 本程序着重在于学习,请于下载后24小时内删除;切记不要使用本程序做一些违法乱纪的行为!!! 禁止商用,违者必究 ...

『精品软件区』

透视方体(可准确设置旋转度)

52Pojie · 52Pojie · 2026-03-19 08:30 UTC

背景:用于学习透视,需要一个可以设置精确旋转度、显示辅助线的方体 功能: 1.能控制旋转 2.显示隐藏辅助线 1.0 下载: https://wwbee.lanzouv.com/iekhX3kzqjkj 密码:3b7c [md]```python import sys ...

『精品软件区』

必剪手机版_2.80.0.apk

52Pojie · 52Pojie · 2026-03-19 08:24 UTC

这是B站官方出品的免费全能视频剪辑神器,超多万粉UP主都在⽤!支持1080P高清无水印导出,操作简单零门槛,小白也能快速上手。内置海量免费素材,包括B站镇站神曲、二次元贴纸、专业转场特效,还有AI语音转字幕、 ...

『精品软件区』

Server Misconfiguration Lifts Lid On FancyBear Credential Theft Operations

CyberPress · Varshini · 2026-03-19 08:24 UTC

A simple web server misconfiguration has provided cybersecurity researchers with an unprecedented view into the inner workings of FancyBear, a sophisticated Russian nation-state threat group. Research...

APTCyber Security News

ClickFix Lures Power LeakNet’s Growing Ransomware Attack Chain

CyberPress · Varshini · 2026-03-19 08:23 UTC

The ransomware group known as LeakNet is rapidly upgrading its attack methods to infect more victims. Previously averaging three targets per month, the group is now moving away from buying stolen netw...

Cyber Security NewsRansomware

求下载道客巴巴文件

52Pojie · trykai · 2026-03-19 08:15 UTC

求下载道客巴巴文件 https://www.doc88.com/p-86119787046642.html

『悬赏问答区』

求能持续更新的26年一建网课视频资料

52Pojie · qq41230179 · 2026-03-19 08:14 UTC
『悬赏问答区』

Open VSX Extension Delivers RAT and Stealer via GitHub Downloader

GBHackers · GBHackers · 2026-03-19 08:06 UTC

An Open VSX extension used by thousands of developers has been caught silently pulling a full-featured remote access trojan and infostealer from GitHub. The KhangNghiem/fast-draft extension, listed on...

cyber securityCyber Security NewsGitHub

求助gps相机

52Pojie · JiangLai1219 · 2026-03-19 07:57 UTC
『悬赏问答区』

蓝奏转夸克

52Pojie · qiqisan193 · 2026-03-19 07:48 UTC

转存文件内容:音乐转存,JAY-退后 转存大小:28m 转存方式:蓝奏转夸克 转存链接:https://syale.lanzoul.com/b00wn68a8j 密码:4jb0

『悬赏问答区』

html+js+excel生成组织结构图

52Pojie · xyxy1111 · 2026-03-19 07:47 UTC

因工作需要,经常要为客户编制组织结构图,就写了这个网页版的工具。当然也可以用思维导图类软件或者office来制作,我这个纯粹属于重复造轮子。 压缩包里包括了两个版本的html,一个有导出下载的功能,一个没有。js文件 ...

『编程语言区』