-
Notifications
You must be signed in to change notification settings - Fork 37
Open
Labels
Description
每日安全资讯(2026-03-05)
- SecWiki News
- Private Feed for M09Ic
- safedv starred 0xZ0F/Z0FCourse_ReverseEngineering
- liamg starred taigrr/spank
- bolucat released 202603041959 at bolucat/Archive
- joaoviictorti starred R41N3RZUF477/PPLwindow
- spf13 starred dolthub/dolt
- phra starred msitarzewski/agency-agents
- CHYbeta starred 0range-x/triple-layer-memory
- Ridter starred biggerstar/wedecode
- safedv starred acedef/SynthAPT
- ZeddYu starred rasbt/LLMs-from-scratch
- anthropics released v2.1.68 at anthropics/claude-code
- Ridter starred tiann/hapi
- safedv starred ZephrFish/ludus-defender-lab
- PeiQi0 starred yorkeccak/Polyseer
- PrefectHQ released 3.6.21.dev4 at PrefectHQ/prefect
- Ascotbe starred koala73/worldmonitor
- 安全客-有思想的安全新媒体
- OneUptime命令注入漏洞可致服务器被完全接管
- Windows错误报告服务ALPC权限提升漏洞PoC已公开
- Google推出iOS版Quick Share,打通安卓到苹果设备的文件传输壁垒
- Zerobotv9僵尸网络开始劫持企业自动化系统
- MS-Agent存在未修复漏洞(CVE-2026-2256),攻击者可劫持AI助手
- Anthropic推出记忆导入功能,助力QuitGPT浪潮下用户迁移对话数据
- Chrome Gemini漏洞可被攻击者远程访问用户摄像头与麦克风
- AuraStealer信息窃密木马活跃传播,攻击者依托48个C2域名持续攻击用户
- 恶意广告通过伪造文本分享站点传播AMOS malext窃密木马来针对macOS用户
- Intel低调关停Clear Linux公共服务,发行版前途未卜
- 博客园 - potatso
- 先知安全技术社区
- 嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
- Recent Commits to cve:main
- Microsoft Security Blog
- Horizon3.ai
- GuidePoint Security
- Securelist
- Binary Ninja
- Malwarebytes
- Intigriti
- rtl-sdr.com
- 奇客Solidot–传递最新科技情报
- 绿盟科技技术博客
- 安全分析与研究
- 黑海洋Wiki | AI机器人硬件开发 | 网络安全攻防实战 | 区块链技术文档教程 - 免费资源平台
- 黑鸟
- 威努特安全网络
- 代码卫士
- Black Hills Information Security, Inc.
- 安全内参
- 青衣十三楼飞花堂
- 天御攻防实验室
- 信安之路
- 安全学术圈
- 看雪学苑
- 中国信息安全
- 天黑说嘿话
- 安全圈
- 安全牛
- 数世咨询
- 火绒安全
- 极客公园
- 嘶吼专业版
- 腾讯安全威胁情报中心
- 吾爱破解论坛
- [【2026春节】解题领红包活动已结束,欢迎分享解题思路,相互学习逆向经验,目前题目还可以试炼,系统依然支持提交验证答案,但已无大额奖励,活动系统延时到3月12日0点下线。
结语:去年高级题比较多,但参与的同学相对较少,因此,今年我们调整了方向,以初中级题为主,希望让更多新人能够从活动中真正收获知识与乐趣。
同时,随着AI的普及,Python程序的应用越来越广泛,我们也特别加入了Python逆向的题目,让大家能更早接触这一重要技能,以备不时之需。而在Web题中,我们还针对AI的介入设计了有趣的陷阱,未来在程序开发中,如何对抗AI也将成为一门必修课,希望这些题目能为大家带来启发。
活动原帖已公开题目和部分同学提交的解题过程,可以进行学习了https://www.52pojie.cn/thread-2092302-1-1.html](https://mp.weixin.qq.com/s?__biz=MjM5Mjc3MDM2Mw==&mid=2651143700&idx=1&sn=0cf445f7e0700b8898b307bf5f295ec2)
- 吴鲁加
- 情报分析师
- 360数字安全
- 安全行者老霍
- Over Security - Cybersecurity news aggregator
- Bitwarden adds support for passkey login on Windows 11
- Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
- Windows 10 KB5075039 update fixes broken Recovery Environment
- Fake LastPass support email threads try to steal vault passwords
- Spyware-grade Coruna iOS exploit kit now used in crypto theft attacks
- Cisco warns of max severity Secure FMC flaws giving root access
- Hacker mass-mails HungerRush extortion emails to restaurant patrons
- La sicurezza nazionale tra quantum, cyber e geopolitica: la relazione 2026 dell’Intelligence
- FBI seizes LeakBase cybercrime forum, data of 142,000 members
- Europol-coordinated action disrupts Tycoon2FA phishing platform
- RedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command | CloudSEK
- Nova Spokesperson Confirms Affiliate-Led Attack on Nebraska Hearing Instruments
- Sprawling FBI, European operation takes down Leakbase cybercriminal forum
- Phishing su Zoom e Meet: la nuova frontiera dell’abuso di software legittimo
- Mississippi medical center reopens clinics hit by ransomware attack
- How a Brute Force Attack Unmasked a Ransomware Infrastructure Network
- Russian hackers deploy new malware in phishing campaign targeting Ukraine
- Ignore All Previous Instructions: Jailbreaking as a de-escalatory peace building practise to resist LLM social media bots
- AI as a Force Multiplier in Cybersecurity
- Mobile malware evolution in 2025
- Major Cyber Attacks in February 2026: BQTLock, Thread-Hijack Phishing, and MFA Bypass Evolution
- Phishing OAuth: campagne contro enti pubblici sfruttano Microsoft
- L’attacco fisico al data center Amazon negli Emirati che ridefinisce il rischio cloud
- Oblivion RAT - An Android Spyware Platform With a Built-In APK Factory
- Come mettere in sicurezza gli agenti AI
- 迪哥讲事
- 国家互联网应急中心CNCERT
- DEF CON Announcements!
- 字节跳动技术团队
- Securityinfo.it
- 360威胁情报中心
- SEI Blog
- SANS Internet Storm Center, InfoCON: green
- Lenny Zeltser
- Schneier on Security
- Rasta Mouse
- LockBoxx
- ICT Security Magazine
- bellingcat
- Security Affairs
- Cisco fixes maximum-severity Secure FMC bugs threatening firewall security
- Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR
- LastPass warns of spoofed alerts aimed at stealing master passwords
- From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
- U.S. CISA adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog
- Data breach at University of Hawaiʻi Cancer Center impacts 1.2 Million individuals
- Instapaper: Unread
- Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
- OpenClaw 0-Click Vulnerability Allows Malicious Websites to Hijack Developer AI Agents
- Clueless cops post seized crypto wallet password. $5M quickly stolen.
- I can't wait for Motorola's GrapheneOS phones Why they're a win for privacy and open source
- A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals
- Investigating Windows File System Artifacts Under CWindows
- MalChela Meets AI Three Paths to Smarter Malware Analysis
- NetSPI
- Trend Micro Research, News and Perspectives
- 安全419
- The Hacker News
- 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
- Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
- New RFP Template for AI Usage Control and AI Governance
- Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
- APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
- CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
- The Register - Security
- 'Hundreds' of Iranian hacking attempts have hit surveillance cameras since the missile strikes
- Malware-laced OpenClaw installers get Bing AI search boost
- LexisNexis confirms data breach at Legal & Professional arm, some customer records affected
- Kaspersky dismisses claims Coruna iPhone exploit kit is connected to NSA-linked operation
- Google feels the need for security speed, so will ship Chrome updates every two weeks
- Deeplinks
- TorrentFreak
- DEFION Research Labs
- Ruckus Unleashed: Multiple vulnerabilities exploited
- Pwn2Own Automotive 2024: Hacking the Autel MaxiCharger
- Pwn2Own Automotive 2024: Hacking the JuiceBox 40
- Pwn2Own Automotive 2024: Hacking the ChargePoint Home Flex (and their cloud...)
- DoNex/DarkRace Ransomware Decryptor
- CVE-2024-20693: Windows cached code signature manipulation
- Bringing process injection into view(s): exploiting all macOS apps using nib files
- Don’t Talk All at Once! Elevating Privileges on macOS by Audit Token Spoofing
- Getting SYSTEM on Windows in style
- Technical analysis of the Genesis Market
- Bad things come in large packages: .pkg signature verification bypass on macOS
- Pwn2Own Miami 2022: ICONICS GENESIS64 Arbitrary Code Execution
- Pwn2Own Miami 2022: Unified Automation C++ Demo Server DoS
- Pwn2Own Miami 2022: AVEVA Edge Arbitrary Code Execution
- Process injection: breaking all macOS security layers with a single vulnerability
- Pwn2Own Miami 2022: Inductive Automation Ignition Remote Code Execution
- Pwn2Own Miami 2022: OPC UA .NET Standard Trusted Application Check Bypass
- CoronaCheck App TLS certificate vulnerabilities
- Sandbox escape + privilege escalation in StorePrivilegedTaskService
- Proctorio Chrome extension Universal Cross-Site Scripting
- Zoom RCE from Pwn2Own 2021
- Adobe Acrobat privilege escalation
- iOS VPN support: 3 different bugs
- Sign in with Apple - authentication bypass
- Jenkins - authentication bypass
- DNS rebinding for HTTPS
- Spring Security - insufficient cryptographic randomness
- XenServer - path traversal leading to authentication bypass
- Volkswagen Auto Group MIB infotainment system - unauthenticated remote code execution as root
- NAPALM - command execution on NAPLM controller from host
- MySQL Connector/J - Unexpected deserialisation of Java objects
- Ansible - command execution on Ansible controller from host
- Observium - unauthenticated remote code execution
- cSRP/srpforjava - obtaining of hashed passwords
- StartEncrypt - obtaining valid SSL certificates for unauthorized domains
- 白帽子章华鹏
- Security Weekly Podcast Network (Audio)
Reactions are currently unavailable