Security News
全球顶尖安全社区实时聚合,追踪最新漏洞、攻防技术与行业动态。
来源:先知社区 · Seebug · The Hacker News 等权威平台 | 每日自动更新
JDK17强封装&高版本JDK反射调用
学点高级玩意儿
DIR-645—ssdp.cgi命令执行复现
记一次漏洞挖掘,借鉴的是D-Link DIR 615645815 service.cgi远程命令执行漏洞的思路,定位system危险函数,然后去看看能否控制参数等。
Xiaomi路由器BE10000 Pro 稳定版 授权后远程RCE漏洞
该漏洞出自Xiaomi路由器BE10000 Pro 稳定版 存在授权后远程RCE漏洞
高版本触发toString的几种方法
JDK17后的高版本触发toString整合
新春杯CTF Misc方向全解分析
2026年新春杯Misc方向所有题目的正反手解析
新春杯CTF RE题目解析
re的进阶的知识,补充常见的理论以及新出现的wasm类型
银狐木马应急响应实录:发现、取证与分析
谁在偷窥你的键盘?揭秘潜伏在系统进程背后的“银狐”
应急响应-Docker Tomcat 挖矿入侵溯源
第二届“启航杯”网络安全挑战赛应急溯源全解
Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if ...
AI Found Twelve New Vulnerabilities in OpenSSL
The title of the post is"What AI Security Research Looks Like When It Works," and I agree: In the latest OpenSSL security release> on January 27, 2026 ...
Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability
In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to ...
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat ...
3 Ways to Start Your Intelligent Workflow Program
Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of ...
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism ...
CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) cat ...
Singapore & Its 4 Major Telcos Fend Off Chinese Hackers
After detecting a zero-day attack, the country's effective response was attributed to the tight relationship between its government and private indust ...
Supply Chain Attack Embeds Malware in Android Devices
Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge.
Poland Energy Survives Attack on Wind, Solar Infrastructure
Russia-aligned groups are probable culprits behind the wiper attacks against renewable energy farms, a manufacturer, and a heating and power plant.
RMM Abuse Explodes as Hackers Ditch Malware
Remote monitoring and management (RMM) software offers hackers multiple benefits, including stealth, persistence, and operational efficiency.
ClickFix Attacks Abuses DNS Lookup Command to Deliver ModeloRAT
ClickFix campaigns have adapted to the latest defenses with a new technique to trick users into infecting their own machines with malware.
Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams could collect disk images, review ...
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be tu ...
Side-Channel Attacks Against LLMs
Here are three papers describing different side-channel attacks against LLMs. "Remote Timing Attacks on Efficient Language Model Inference": Abstract: ...
Weekly Update 491
Well, the ESP32 Bluetooth bridge experiment was a complete failure. Not the radios themselves, they're actually pretty cool, but there's just no way I ...
Operation DoppelBrand: Weaponizing Fortune 500 Brands
The GS7 cyber-threat group targets US financial institutions with near-perfect imitations of corporate portals to steal credentials and gain remote ac ...
260K+ Chrome Users Duped by Fake AI Browser Extensions
30 copycat apps tricked users, and Google itself, into thinking they're legitimate AI tools.
The Promptware Kill Chain
Attacks against modern generative artificial intelligence (AI) large language models (LLMs) pose a real threat. Yet discussions around these attacks a ...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I'm speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Th ...
Friday Squid Blogging: Do Squid Dream?
An exploration of the interesting question.
Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing Capabilities
Zscaler's acquisition of SquareX comes as competitors like CrowdStrike and Palo Alto Networks also invest in secure browser technologies.
MUZZLE:针对间接提示注入攻击的网络智能体自适应智能红队测试
作者:Georgios Syros, Evan Rose, Brian Grinstead 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2602.09222v1 摘要 基于大语言模型(LLM)的网络智能体正被广泛部署,通过直接与网站交互并代表用户执行操作 ...
3D Printer Surveillance
New York is contemplating a bill that adds surveillance to 3D printers: New York’s 20262027 executive budget bill (S.9005 / A.10005) includes languag ...
网络探索者:在真实世界攻击模拟环境中评估大语言模型的攻击性安全能力
作者:Nanda Rani, Kimberly Milner, Minghao Shao等 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2602.08023v2 摘要 真实世界的攻击性安全操作具有本质上的开放性:攻击者探索未知的攻击面、在不确定的情况下修 ...
Rewiring Democracy Ebook is on Sale
I just noticed that the ebook version of Rewiring Democracy is on sale for $5 on Amazon, Apple Books, Barnes & Noble, Books A Million, Google Play, Ko ...
Prompt Injection Via Road Signs
Interesting research: "CHAI: Command Hijacking Against Embodied AI." Abstract: Embodied Artificial Intelligence (AI) promises to handle edge cases in ...
利用大语言模型智能体识别恶意软件二进制文件中的攻击者战术、技术与流程
作者:ZHOU XUAN, XIANGZHE XU, MINGWEI ZHENG, LOUIS ZHENG-HUA TAN等 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2602.06325v1 理解恶意软件二进制文件中的战术、技术与流程(TTPs)是安 ...
Weekly Update 490
A big "thank you" to everyone who helped me troubleshoot the problem with my "Print Screen" button on the new PC. Try as we all might, none of us coul ...
LogicScan:一种基于大语言模型的智能合约业务逻辑漏洞检测框架
作者:JIAQI GAO, ZIJIAN ZHANG, YUQIANG SUN, YE LIU等 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2602.03271v1 摘要 业务逻辑漏洞已成为智能合约中最具破坏性但最难以理解的漏洞类型之一。与重入攻击或算 ...
Weekly Update 489
This week I'm in Hong Kong, and the day after recording, I gave the talk shown in the image above at INTERPOL's Cybercrime Expert Group. I posted a li ...
Okara:基于基础模型的 Android 应用 TLS 中间人攻击漏洞检测与溯源
作者:Haoyun Yang, Ronghong Huang, Yong Fang等 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2601.22770v1 摘要 传输层安全(TLS)是保障在线通信安全的基础,但证书验证过程中的漏洞可能导致中间人(MitM ...
AI网络爬虫安全白皮书
Author: Guancheng Li and Zheng Wang of Tencent Xuanwu Lab 本文是腾讯玄武实验室发布的《AI网络爬虫安全白皮书》。我们系统分析了 AI 时代服务端浏览器 / 爬虫在真实业务中的典型使用方式,以及由此带来的新的攻击面与风险。 在这篇白皮书中,我们 ...
突破协议限制:模型上下文协议规范的安全性分析及工具集成型 LLM 智能体中的提示注入漏洞
作者:Narek Maloyan, Dmitry Namiot 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2601.17549v1 摘要 模型上下文协议(MCP)已成为大型语言模型(LLMs)与外部工具集成的事实标准,但目前尚未有针对该协议规范的正式安 ...
FOCA:基于双曲交叉注意力的多模态恶意软件分类
作者:Nitin Choudhury, Bikrant Bikram Pratap Maurya, Orchid Chetia Phukan, Arun Balaji Buduru 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2601.17638v1 摘 ...
Weekly Update 488
It's the discussion about the reaction of some people in the UK regarding their impending social media ban for under 16s that bugged me most. Most not ...
DCeption:针对 CCS 电动汽车充电系统的真实无线中间人攻击
作者:Marcell Szakály, Martin Strohmeier, Ivan Martinovic, Sebastian Köhler 译者:知道创宇404实验室翻译组 原文链接:https://arxiv.org/html/2601.15515v1 摘要 电动汽车(EV)的普及正迅速推进 ...
Kimwolf Botnet Lurking in Corporate, Govt. Networks
A new Internet-of-Things botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate in massive distribut ...
Weekly Update 487
I thought Scott would cop it first when he posted about what his solar system really cost him last year. "You're so gonna get that stupid AI-slop resp ...
Weekly Update 486
I’m in Oslo! Flighty is telling me I’ve flown in or out of here 43 times since a visit in 2014 set me on a new path professionally and, many years lat ...
Patch Tuesday, January 2026 Edition
Microsoft today issued patches to plug at least 113 security holes in its various Windows operating systems and supported software. Eight of the vulne ...
Who Decides Who Doesn’t Deserve Privacy?
Remember the Ashley Madison data breach? That was now more than a decade ago, yet it arguably remains the single most noteworthy data breach of all ti ...
Who Benefited from the Aisuru and Kimwolf Botnets?
Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising ...
Weekly Update 485
15 mins and 40 seconds. That's how long it took to troubleshoot the first tech problem of 2026, and that's how far you'll need to skip through this vi ...
ComfyUI-Manager 远程代码执行风险通告
近期腾讯玄武实验室发现可视化 AI 工作流工具 ComfyUI 的官方扩展组件 ComfyUI-Manager 中存在一个高危漏洞(CVE-2025-67303)。利用该漏洞可在无需任何账号的情况下远程入侵安装 ComfyUI 的系统。玄武实验室在发现漏洞后向 ComfyUI 官方进行了报告,目前该 ...
The Kimwolf Botnet is Stalking Your Local Network
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been ...
Happy 16th Birthday, KrebsOnSecurity.com!
KrebsOnSecurity.com celebrates its 16th anniversary today! A huge "thank you" to all of our readers -- newcomers, long-timers and drive-by critics ali ...
Dismantling Defenses: Trump 2.0 Cyber Year in Review
The Trump administration has pursued a staggering range of policy pivots this past year that threaten to weaken the nation’s ability and willingness t ...
Most Parked Domains Now Serving Malicious Content
Direct navigation -- the act of visiting a website by manually typing a domain name in a web browser -- has never been riskier: A new study finds the ...
Microsoft Patch Tuesday, December 2025 Edition
Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of ...
量子计算机距离攻破 RSA-2048 还有多远
Author: Guancheng Li of Tencent Xuanwu Lab 在当今数字世界中,RSA‑2048 与 ECC 等经典公钥密码是最广泛应用的加密标准,支撑着网络安全、金融交易和隐私保护的底层信任。然而,这一基石正面临量子计算的潜在威胁。理论上,量子计算机能够以远快于经典计算机的 ...
我们的AI发现了一个零知识证明库的漏洞,Sam Altman的项目也用了这个库
Author: Guancheng Li, Xiaolin Zhang and Yang Yu of Tencent Xuanwu Lab 2025 年 8 月,腾讯玄武实验室的阿图因自动化漏洞挖掘引擎在零知识证明库 gnark 中发现了一个高危漏洞(CVE-2025-57801,CVSS 8.6) ...