惯性聚合
高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文
在惯性聚合中打开
即将跳转到惯性聚合
3
在聚合应用中查看完整内容和互动
立即跳转
取消
推荐订阅源
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
Apple Machine Learning Research
爱范儿
WordPress大学
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
美
美团技术团队
博
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
D
Docker
Google DeepMind News
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
Recent Announcements
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
The Register - Security
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA
Help Net Security
Deleted Google API keys keep working for up to 23 minutes, researchers warn
Kore.ai unveils AI-native platform for enterprise multiagent systems
Suspected KimWolf botnet admin arrested over DDoS-for-hire operation
Versa extends zero trust principles to AI agents and MCP workflows
GitLab 19.0 adds AI workflows, secrets management, and self-hosted model support
Proton Pass adds monitored credential sharing for AI agents
Keepnet contributes voice and SMS phishing data to the 2026 Verizon DBIR
CISA’s new KEV nomination form opens reporting to vendors and researchers
Microsoft 365 users targeted by new phishing threat that bypasses MFA
Meet Fractal, an OS made for microarchitecture reverse engineering
Downtime has become a $600 billion business problem
The new economics of fraud: Cheaper, faster, more convincing
New infosec products of the week: May 22, 2026
Microsoft open-sources tools for designing and testing AI agents
Authorities dismantle First VPN, used by ransomware actors
GitHub, Grafana Labs breaches traced back to TanStack supply chain compromise
Virtru centers file collaboration around data-level protection
ASAPP expands adversarial testing for enterprise AI systems
Tenable Hexa AI automates remediation across attack surfaces
Riverbed introduces new Aternity tools for autonomous IT operations
Forward launches Predict to test network changes before deployment
CTERA brings AI insights and automation for unstructured data
Terra adds continuous network exploitation validation to its platform
Why AI changed the threat model for travel technology
Most dark web activity revolves around a handful of topics
AI red teaming agents change how LLMs get tested
Product showcase: Bitdefender Mobile Security for iOS protects privacy where scams begin
Cyber threats push SMBs to spend more on security
Webworm APT targets European government organizations with new backdoors
Verizon DBIR: Vulnerability exploitation is the dominant initial access vector
NanoCo lands $12 million seed funding, launches enterprise assistant built on NanoClaw
FBI: $388 million lost in crypto ATM scams in 2026
ArmorCode gives security teams AI workers for exposure and remediation
Novata uses AI to map risk across portfolios and supply chains
TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension
Trust3 AI focuses on AI agent risks with MCP Security layer
Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals
Darwinium updates mobile SDKs to detect remote access scam activity
Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)
Communicating cyber risk in dollars boards understand
CVE Lite CLI: Open-source dependency vulnerability scanner
When your AI assistant has the keys to production
7 hard truths security pros should know: 2026 DevOps Threats Report
What happens when your identity provider becomes the kill chain
PureLogs infostealer is stealing credentials worldwide
Selector extends AI-driven observability into multi-cloud environments
LaunchDarkly adds real-time controls for AI agents in production
Canonical ships Ubuntu Core 26 with 15 years of security maintenance
New macOS infostealer impersonates Apple, Microsoft, and Google in a single attack chain
The end of unencrypted Discord calls is here
微软 Defender 漏洞在野外被利用(CVE-2026-41091, CVE-2026-45498)
Zeljka Zorz
·
2026-05-21
·
via
Help Net Security
攻击者正在利用两个微软 Defender 漏洞(CVE-2026-41091 和 CVE-2026-45498),微软…
此内容由惯性聚合(RSS阅读器)自动聚合整理,仅供阅读参考。
原文来自
— 版权归原作者所有。