-
Notifications
You must be signed in to change notification settings - Fork 36
Open
Labels
Description
每日安全资讯(2026-01-14)
- SecWiki News
- 奇安信攻防社区
- Doonsec's feed
- 揭秘 Windows 隐藏取证证据:AutoLogger-Diagtrack-Listener.etl 的奥秘
- 恶意软件的生存之道:监视器与辅助器组件解析
- 分享图片
- 金刚狼1.8支持自定义程序内存加载执行
- OSCP/OSEP一对一私教直通车:协议保障,直通高级渗透测试专家
- 关系很好的2个同事被裁了,本以为是他们能力差爱摸鱼,没想到一个工资3w,一个工资2w,而且还马上找到涨薪30%的新工作,真是慕了。
- 黑客如何反击美国移民及海关执法局(ICE)
- 大华智能物联管理平台evo-apigw/evo-arsm/1.0.0/ars/list接口存在SQL注入漏洞 附POC
- 【人工智能】GM/T 0007 密码行业标准到底去了哪里?
- 【安全工具】从底层突破WAF:自动化发现协议级漏洞,绕过Web防火墙
- 【AI安全】暴击!垂域大模型的致命死穴:特种攻击
- 信息搜集之边缘资产和隐形资产的发掘
- 世界经济论坛联合埃森哲发布《2026年全球网络安全展望》
- 全国网安标委发布《人工智能应用安全指引 总则(征求意见稿)》等4项网络安全标准实践指南
- 入侵论坛(BreachForums)遭黑客攻击:热门暗网论坛全部用户记录被曝光
- 年终查收入了吗?考了网安证书,这样操作可以减税!
- 使用burpMCP和kaliMCP自动化渗透
- src专项挖掘知识库
- 【大话工控安全】工业控制系统行业知识:电力行业火力发电场景
- 数据不懂用=白忙活?这门线上课教你用大数据驱动精准决策
- 有人@你!2025年度品牌问卷调查获奖名单公布!
- 【接口漏洞第五章第二节】API批量赋值漏洞实战:以电商折扣参数篡改为例
- 【邀请函】破阵阁・网安淬锋公开赛邀您参加!现金奖、京东卡、证书已就位!
- 新的VoidLink云原生恶意软件攻击具有自删功能的Linux系统
- paper - Last paper
- LevelBlue Blog
- 安全客-有思想的安全新媒体
- Private Feed for M09Ic
- strands-agents released v1.22.0 at strands-agents/sdk-python
- bolucat released 202601131939 at bolucat/Archive
- mgeeky starred nikitastupin/clairvoyance
- FunnyWolf starred nextlevelbuilder/ui-ux-pro-max-skill
- mgeeky starred EmilStenstrom/justhtml
- ManassehZhou starred google/starlark-go
- Mr-xn forked Mr-xn/PicList from Kuingsmile/PicList
- FunnyWolf starred bytedance/UI-TARS-desktop
- timwhitez starred vercel-labs/agent-browser
- PrefectHQ released 3.6.11.dev3 at PrefectHQ/prefect
- CHYbeta starred ihower/zh-tw-embedding-model-benchmark
- ourren starred sansan0/TrendRadar
- 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
- Tenable Blog
- Recent Commits to cve:main
- Microsoft Security Blog
- Sucuri Blog
- ElcomSoft blog
- 美团技术团队
- Horizon3.ai
- CCC Event Blog
- Malwarebytes
- The Trail of Bits Blog
- LevelBlue SpiderLabs Blog
- Bug Bounty in InfoSec Write-ups on Medium
- rtl-sdr.com
- 奇客Solidot–传递最新科技情报
- bishopfox.com
- HackerNews
- Security Blog | Praetorian
- 安全分析与研究
- 腾讯玄武实验室
- 绿盟科技技术博客
- 黑鸟
- 青衣十三楼飞花堂
- 雷神众测
- 安全客
- 代码卫士
- 虎符智库
- 暗影安全
- 威努特安全网络
- 二道情报贩子
- 绿盟科技研究通讯
- 安全内参
- 绿盟科技CERT
- 天御攻防实验室
- 安全研究GoSSIP
- 看雪学苑
- 安全圈
- 中国信息安全
- 补天平台
- 微步在线
- 安全牛
- 火绒安全
- 极客公园
- 字节跳动安全中心
- 嘶吼专业版
- 黑伞安全
- 360Quake空间测绘
- 斗象智能安全
- 数世咨询
- 情报分析师
- 软件安全与逆向分析
- Qualys Security Blog
- 360数字安全
- 迪哥讲事
- Over Security - Cybersecurity news aggregator
- Ukraine's army targeted in new charity-themed malware campaign
- New VoidLink malware framework targets Linux cloud servers
- More than 40 countries impacted by North Korea IT worker scams, crypto thefts
- Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system
- Central Maine Healthcare breach exposed data of over 145,000 people
- Belgian hospital AZ Monica shuts down servers after cyberattack
- Ukraine parliament approves resignation of security service chief in major reshuffle
- New Windows updates replace expiring Secure Boot certificates
- Man to plead guilty to hacking US Supreme Court filing system
- Target employees confirm leaked source code is authentic
- Windows 11 KB5074109 & KB5073455 cumulative updates released
- Microsoft releases Windows 10 KB5073724 extended security update
- Microsoft January 2026 Patch Tuesday fixes 3 zero-days, 114 flaws
- Microsoft Patch Tuesday for January 2026 — Snort rules and prominent vulnerabilities
- Google confirms Android bug causing volume key issues
- Tp-Link Router Deep Research
- majd/ipatool: Command-line tool that allows searching and downloading app packages (known as ipa files) from the iOS App Store
- Android recon for Bug Bounty hunters: A complete guide
- Senior military cyber operator removed from Russia task force
- Security Research in the Age of AI Tools
- Betterment confirms data breach after wave of crypto scam emails
- NIS2, AI Act, CRA: perché il 2026 segna una svolta per la sicurezza cyber
- Privilegi di accesso e identità alimentate dall’AI: rischi e mitigazioni
- Suspected ransomware attack threatens one of South Korea’s largest companies
- Kremlin-linked hackers pose as charities to spy on Ukraine’s military
- Allarme password aziendali deboli: più del 40% è violabile in meno di un’ora
- Convincing LinkedIn comment-reply tactic used in new phishing
- Asset management: perché l’IT non deve essere l’asset owner e come farlo bene
- Target employees confirm leaked code after ‘accelerated’ Git lockdown
- Wraps - AWS Email Pricing with Modern Developer Experience
- Report annuale Polizia Postale 2025: la normalità dell’attacco, il dovere della resilienza
- Quando un incidente cyber smette di essere un problema tecnico e diventa di interesse pubblico
- CastleLoader: A Deep Dive into Stealthy Loader Targeting Government Sector
- deVixor: An Evolving Android Banking RAT with Ransomware Capabilities Targeting Iran
- Securityinfo.it
- IT Service Management News
- T00ls安全
- Troy Hunt's Blog
- Tor Project blog
- SANS Internet Storm Center, InfoCON: green
- bellingcat
- 云鼎实验室
- Trend Micro Research, News and Perspectives
- The Register - Security
- Popular Python libraries used in Hugging Face models subject to poisoned metadata attack
- AI and automation could erase 10.4 million US roles by 2030
- Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam
- Federal agencies told to fix or ditch Gogs as exploited zero-day lands on CISA hit list
- Mandiant open sources tool to prevent leaky Salesforce misconfigs
- Court tosses appeal by hacker who opened port to coke smugglers with malware
- Britain goes shopping for a rapid-fire missile to help Ukraine hit back
- India demands crypto outfits geolocate customers, get a selfie to prove they’re real
- GRAHAM CLULEY
- Schneier on Security
- TorrentFreak
- Security Affairs
- ICT Security Magazine
- The Hacker News
- Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
- Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
- [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
- New Advanced Linux VoidLink Malware Targets Cloud and container Environments
- What Should We Learn From How Attackers Leveraged AI in 2025?
- ServiceNow Patches Critical AI Platform Flaw Allowing Unauthenticated User Impersonation
- New Malware Campaign Delivers Remcos RAT Through Multi-Stage Windows Attack
- CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution
- 矛和盾的故事
- Security Weekly Podcast Network (Audio)
- 网安寻路人