intelligence gathering
-
The United States uses the "Sour Fox Platform" to launch cyber attacks on China and Russia!
Recently, many scientific research institutions in China have discovered traces of the activity of the "verifier" Trojan program. A research report released by 360 on the 28th showed that according to the available US NSA confidential documents: "Authenticator" is a small implanted Trojan that can be deployed remotely...
-
WPS Office for windows is dealing with a certain OLE mechanism remote code vulnerability
Vulnerability description: WPS office software is an office software suite independently developed by Kingsoft Office Software Co., Ltd. It can realize the most commonly used functions of office software such as text, tables, presentations, etc., covering windows, macos, L...
-
U.S. Central Intelligence Agency (CIA) "Hive" Malicious Code Attack Control Weapon Platform Analysis Report
Recently, the National Computer Virus Emergency Response Center analyzed the "Hive" malicious code attack control weapon platform (hereinafter referred to as the "Hive Platform"). The Hive Platform is affiliated to the Center for Digital Innovation (DDI) of the U.S. Central Intelligence Agency (CIA). Information…
-
Nvidia’s core asset data was “open sourced” by hackers
NVIDIA's core source code has just been "open sourced", and the information of more than 70,000 employees has been leaked. At the same time, hackers "helped" Samsung open source the code, and by the way, Qualcomm was also involved. It seems that the South American hacker group Lapsus$ is going to play a big game with Nvidia. source code…
-
StripChat adult video website vulnerability leaks sensitive data of tens of millions of users
The security flaw was discovered by data breach hunter Bob Diachenko, who discovered an ElasticSearch database cluster that was accessible online without authentication. Diachenko in November…
-
Russia’s Federal Security Service (FSB) arrests REvil ransomware gang
Russia’s Federal Security Service (FSB) has taken the unprecedented step of announcing the arrests of several members of the notorious REvil ransomware gang
-
Hackers' ransom demand was rejected, and confidential British police data leaked on the dark web
The Clop gang has revealed a new victim company on its data breach site on the dark web, Dacoll Limited, an ICT managed services, network infrastructure and electrical contracting provider that has access to police state computing...
-
The Apache Log4j2 component was once again exposed to a high-risk vulnerability, denial of service (CVE-2021-45105)
1. Vulnerability description log4j is an open source log component implemented by apache. Logback is also designed by the author of log4j. It has better features and is a log framework used to replace log4j. It is the native implementation of slf4j...
-
Improper Apache Kafka cluster configuration and sensitive data leakage
Kafdrop is an open source web UI visual management interface for Apache Kafka. It is an open source cloud native platform for collecting, analyzing, storing and managing data flows. Kafka is widely used in finance, big data analysis and large-scale mutual...
-
US State Department and diplomats' iPhones suspected of being hacked by spyware
Apple notified several U.S. Embassy and State Department employees that their iPhones may have been targeted by an unidentified attacker using a security code developed by the controversial Israeli company NSO, Reuters and the Washington Post reported. Grou…