惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Google DeepMind News
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
爱范儿
爱范儿
WordPress大学
WordPress大学
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
美团技术团队
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
MyScale Blog
D
Docker
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
AWS News Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
NISL@THU
The Register - Security
The Register - Security
Recent Commits to openclaw:main
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA

Help Net Security

Deleted Google API keys keep working for up to 23 minutes, researchers warn Kore.ai unveils AI-native platform for enterprise multiagent systems Suspected KimWolf botnet admin arrested over DDoS-for-hire operation Versa extends zero trust principles to AI agents and MCP workflows GitLab 19.0 adds AI workflows, secrets management, and self-hosted model support Proton Pass adds monitored credential sharing for AI agents Keepnet contributes voice and SMS phishing data to the 2026 Verizon DBIR CISA’s new KEV nomination form opens reporting to vendors and researchers Microsoft 365 users targeted by new phishing threat that bypasses MFA Meet Fractal, an OS made for microarchitecture reverse engineering Downtime has become a $600 billion business problem The new economics of fraud: Cheaper, faster, more convincing New infosec products of the week: May 22, 2026 Microsoft open-sources tools for designing and testing AI agents Authorities dismantle First VPN, used by ransomware actors GitHub, Grafana Labs breaches traced back to TanStack supply chain compromise Virtru centers file collaboration around data-level protection ASAPP expands adversarial testing for enterprise AI systems Tenable Hexa AI automates remediation across attack surfaces Riverbed introduces new Aternity tools for autonomous IT operations Forward launches Predict to test network changes before deployment CTERA brings AI insights and automation for unstructured data Terra adds continuous network exploitation validation to its platform Why AI changed the threat model for travel technology Most dark web activity revolves around a handful of topics AI red teaming agents change how LLMs get tested Product showcase: Bitdefender Mobile Security for iOS protects privacy where scams begin Cyber threats push SMBs to spend more on security Webworm APT targets European government organizations with new backdoors Verizon DBIR: Vulnerability exploitation is the dominant initial access vector NanoCo lands $12 million seed funding, launches enterprise assistant built on NanoClaw FBI: $388 million lost in crypto ATM scams in 2026 ArmorCode gives security teams AI workers for exposure and remediation Novata uses AI to map risk across portfolios and supply chains TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension Trust3 AI focuses on AI agent risks with MCP Security layer Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals Darwinium updates mobile SDKs to detect remote access scam activity Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585) Communicating cyber risk in dollars boards understand CVE Lite CLI: Open-source dependency vulnerability scanner When your AI assistant has the keys to production 7 hard truths security pros should know: 2026 DevOps Threats Report What happens when your identity provider becomes the kill chain PureLogs infostealer is stealing credentials worldwide Selector extends AI-driven observability into multi-cloud environments LaunchDarkly adds real-time controls for AI agents in production Canonical ships Ubuntu Core 26 with 15 years of security maintenance New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain The end of unencrypted Discord calls is here
微软 Defender 漏洞在野外被利用(CVE-2026-41091, CVE-2026-45498)
Zeljka Zorz · 2026-05-21 · via Help Net Security
攻击者正在利用两个微软 Defender 漏洞(CVE-2026-41091 和 CVE-2026-45498),微软…