惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Schneier on Security
Schneier on Security
T
The Exploit Database - CXSecurity.com
The Register - Security
The Register - Security
Malwarebytes
Malwarebytes
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
Cisco Talos Blog
Cisco Talos Blog
F
Future of Privacy Forum
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
V
Vulnerabilities – Threatpost
Latest news
Latest news
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
月光博客
月光博客
F
Fox-IT International blog
K
Kaspersky official blog
T
ThreatConnect
美团技术团队
I
Intezer
博客园 - Franky
T
True Tiger Recordings
S
Secure Thoughts
博客园 - 叶小钗
S
Security Archives - TechRepublic
Hugging Face - Blog
Hugging Face - Blog
博客园 - 司徒正美
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
Apple Machine Learning Research
Apple Machine Learning Research
酷 壳 – CoolShell
酷 壳 – CoolShell
P
Proofpoint News Feed
J
Java Code Geeks
S
SegmentFault 最新的问题
Martin Fowler
Martin Fowler
T
Troy Hunt's Blog
人人都是产品经理
人人都是产品经理
博客园 - 【当耐特】
Last Week in AI
Last Week in AI
H
Hacker News: Front Page
Spread Privacy
Spread Privacy
T
Threat Research - Cisco Blogs
The Cloudflare Blog
罗磊的独立博客
C
Cybersecurity and Infrastructure Security Agency CISA
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
Google DeepMind News
Google DeepMind News
博客园_首页
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
F
Fortinet All Blogs
V
V2EX
aimingoo的专栏
aimingoo的专栏
Project Zero
Project Zero
Microsoft Azure Blog
Microsoft Azure Blog

CSO Online

Microsoft says it's making AI 'safe for work' in your browser Why your AI strategy stops where the PLC starts: Hard lessons from the OT frontlines Identity as the primary attack surface: What modern breaches are really exploiting Google folds CodeMender into agent ecosystem amid push for AI-led AppSec Critical vulnerability in Cisco Secure Workload rated at maximum severity Microsoft patches two zero-day flaws in Defender Unpatched ChromaDB flaw leaves servers open to remote code execution Microsoft releases open-source tools to operationalize AI agent safety AI becoming an SOC imperative for curtailing emerging cyber threats Microsoft is working on a patch for 'YellowKey' attack on Bitlocker, offers temporary fix Drupal admins rushing to patch maximum severity SQL injection vulnerability GitHub admits major source code leak after 3,800 internal repositories breached SHub Reaper impersonates Apple, Google, and Microsoft in one MacOS attack chain Why some security fixes never reach your vulnerability dashboard Microsoft disrupts malware code-signing service used by ransomware gangs Contractor’s public GitHub account exposed GovCloud and CISA credentials AntV data visualization tool the latest to be hit by ongoing npm supply chain attacks GitHub scales back bug bounties, reminds users security is their responsibility too Internet Explorer may be dead, but its ghost still runs malware 7 tips for accelerating cyber incident recovery SIEM-Kaufratgeber Schwachstellen managen: Die besten Vulnerability-Management-Tools Security-Infotainment: Die besten Hacker-Dokus Microsoft May security patch fails for some due to boot partition size glitch AI cyberattackers are getting better faster New image-based prompt injection attack targets multimodal AI models ‘Patched’ Windows bug resurfaces 6 years later as working SYSTEM-level exploit AI coding is fueling a secrets-sprawl crisis few CISOs are containing Why the best security investment a board can make in 2026 isn’t another tool Expired domain leads to supply chain attack on node-ipc npm package Exchange Server zero-day vulnerability can be triggered by opening a malicious email Cisco warns of an actively exploited SD-WAN flaw with max severity Autonomous systems are finally working. Security is next EU’s Cyber Resiliency Act will put IT leaders to the test The economics of ransomware 3.0 AI agent finds 18-year-old remote code execution flaw in Nginx Meet Fragnesia, the third Linux kernel vulnerability in a month FlowerStorm phishing gang adopts virtual-machine obfuscation to evade email defenses PraisonAI vulnerability gets scanned within 4 hours of disclosure What CISOs need to land a board role Fired employee sought AI help to hide deletion of hosting firm’s customer data Fortinet fixes two critical RCE flaws in FortiAuthenticator and FortiSandbox What happens when China’s AI catches up to Mythos? Microsoft’s new AI system finds 16 Windows flaws, including four critical RCEs Palo Alto bets on identity security for autonomous AI with Idira launch ClickFix finds a backup plan in PySoxy proxy chains CISA’s AI SBOM guidance pushes software supply-chain oversight into new territory 2026 CSO Award winners showcase business-enabling cyber innovation Google entdeckt erstmals KI-basierten Zero-Day-Exploit Der Kaufratgeber für Breach & Attack Simulation Tools May Patch Tuesday roundup: Critical holes in Windows Netlogon, DNS, and SAP S/4HANA Mistral AI SDK, TanStack Router hit in npm software supply chain attack OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos Fake Claude Code takes the IElevator to your browser secrets cPanel flaw exposes enterprises to hosting supply-chain risks Developer workstations are the new beachhead CISOs step into the AI spotlight Why patching SLAs should be the floor, not the strategy Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen Customer Identity & Access Management: Die besten CIAM-Tools Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched Entries now open for the 2026 CSO30 Australia Awards Lyrie.ai Joins First Batch of Anthropic’s Cyber Verification Program Google discovers weaponized zero-day exploits created with AI Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads New ‘Dirty Frag’ exploit targets Linux kernel for root access AI security is repeating endpoint security's biggest mistake 8 guiding principles for reskilling the SOC for agentic AI 1,800+ MCP servers exposed without authentication: How zero trust can secure the AI agent revolution Five new holes, one exploited, found in Ivanti Endpoint Manager Mobile Claude in Chrome is taking orders from the wrong extensions Your CTEM program is probably ignoring MCP. Here’s how to fix it Pen tests show AI security flaws far more severe than legacy software bugs Your refresh plan has a CVE blind spot Become a millionaire by bug hunting on Android 13 new critical holes in JavaScript sandbox allow execution of arbitrary code Ollama vulnerability highlights danger of AI frameworks with unrestricted access LinkedIn illegally blocking free accounts from seeing 'who's viewed your profile' data, group alleges Bots in translation: Can AI really fix SIEM rule sprawl across vendors? Critical Palo Alto Networks software bug hits exposed firewalls CISOs: Align cyber risk communication with boardroom psychology Ten years later, has the GDPR fulfilled its purpose? US government agency to safety test frontier AI models before release Iranian state-backed spies pose as ransomware slingers in false flag attacks New malware turns Linux systems into P2P attack networks Poisoned truth: The quiet security threat inside enterprise AI Train like you fight: Why cyber operations teams need no-notice drills Die besten DAST- & SAST-Tools Supply-chain attacks take aim at your AI coding agents Edge browser leaves passwords exposed in plain text, says researcher CISA mulls new three-day remediation deadline for critical flaws CISA pushes critical infrastructure operators to prepare to work in isolation Oracle will patch more often to counter AI cybersecurity threat AI finds 20-year-old bugs in PostgreSQL and MariaDB Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs CISOs step up to the security workforce challenge 10 Anzeichen für einen schlechten CSO Anthropic Mythos spurs White House to weigh pre-release reviews for high-risk AI models The Winter Games effect: When gold meets DDoS How orphaned applications are quietly fueling your shadow IT problem
Police take down VPN service (this time with a good reason)
2026-05-23 · via CSO Online

European authorities have cracked down on a VPN that has been used for various criminal activities.

The operation, led by investigators in France and the Netherlands with help from Europol and Eurojust, has dismantled First VPN, a service that has been heavily promoted within Russia as a way of evading law enforcement. Criminals used it to conceal their identities and infrastructure while carrying out ransomware attacks, large-scale fraud, data theft, and other serious offences.

While First VPN’s fates seems well-deserved, there are concerns about wider attempts by governments and law enforcers to clamp down on users of VPN services. Various legislations have tried to implement new laws restricting access to the internet, in particular, those seeking to limit minors from accessing social media and other sites deemed inappropriate by authorities. Australia has already brought in such a law and the UK is looking to follow suit. However. VPNs providers have fought back, claiming that their offerings are a vital tool in the preservation of the internet as a free and open service — and in securing regular business activities for many enterprises.

Ina recent blog post Mozilla said, “Blunt interventions like mandatory age assurance and restricting access to tools like VPNs are not effective in improving the protection afforded to young people online, while undermining the fundamental rights of all users.”

Any restrictions against VPNs in the US are likely to fall foul of the First Amendment. Attempts by lawmakers to prohibit their use, such as the one proposed in Utah, are looking unlikely to succeed.

This article first appeared on Computerworld.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.