Main combat network weapons
-
Google chrome V8 JavaScript Engine Type Obfuscation Remote Code Execution Vulnerability
CVE-2025-6554 is a Type Confusion vulnerability in the Google Chrome V8 JavaScript engine. Type Confusion is a common class of memory corruption vulnerabilities that can lead to unsafe memory operations when a program incorrectly interprets one data type as another, allowing an attacker to execute arbitrary code on the victim's system.
-
North Korean hackers stole $3 billion in cryptocurrency
According to reports, North Korean state-level hacker groups Kimsuky, Lazarus Group and Andariel have stolen approximately $3 billion worth of cryptocurrency in the past six years. The hackers primarily targeted cryptocurrency exchanges, but also targeted individual users and venture capital firms.
-
Investigation report on the US NSA attack on Northwestern Polytechnical University in my country
Recently, Northwestern Polytechnical University issued a "Public Statement" stating that the school suffered from overseas cyber attacks. The Beilin Branch of the Public Security Bureau of Xi'an City, Shaanxi Province immediately issued a "Police Information Bulletin", confirming that a number of Trojan horse program samples originating from abroad were found in the information network of Northwestern Polytechnical University. The Xi'an police...
-
U.S. Central Intelligence Agency (CIA) "Hive" Malicious Code Attack Control Weapon Platform Analysis Report
Recently, the National Computer Virus Emergency Response Center analyzed the "Hive" malicious code attack control weapon platform (hereinafter referred to as the "Hive Platform"). The Hive Platform is affiliated to the Center for Digital Innovation (DDI) of the U.S. Central Intelligence Agency (CIA). Information…