惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

GbyAI
GbyAI
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
P
Proofpoint News Feed
L
Lohrmann on Cybersecurity
S
Secure Thoughts
Attack and Defense Labs
Attack and Defense Labs
人人都是产品经理
人人都是产品经理
Stack Overflow Blog
Stack Overflow Blog
W
WeLiveSecurity
O
OpenAI News
SecWiki News
SecWiki News
博客园 - Franky
NISL@THU
NISL@THU
Microsoft Azure Blog
Microsoft Azure Blog
T
Tor Project blog
Microsoft Security Blog
Microsoft Security Blog
aimingoo的专栏
aimingoo的专栏
Security Latest
Security Latest
H
Hacker News: Front Page
Google Online Security Blog
Google Online Security Blog
P
Privacy & Cybersecurity Law Blog
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
D
Darknet – Hacking Tools, Hacker News & Cyber Security
月光博客
月光博客
李成银的技术随笔
Spread Privacy
Spread Privacy
F
Full Disclosure
F
Fortinet All Blogs
T
The Exploit Database - CXSecurity.com
Vercel News
Vercel News
AWS News Blog
AWS News Blog
WordPress大学
WordPress大学
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
V
Visual Studio Blog
J
Java Code Geeks
博客园 - 三生石上(FineUI控件)
G
Google Developers Blog
云风的 BLOG
云风的 BLOG
博客园 - 司徒正美
Engineering at Meta
Engineering at Meta
Last Week in AI
Last Week in AI
P
Palo Alto Networks Blog
宝玉的分享
宝玉的分享
T
True Tiger Recordings
N
News and Events Feed by Topic
酷 壳 – CoolShell
酷 壳 – CoolShell
Cisco Talos Blog
Cisco Talos Blog
N
News | PayPal Newsroom
S
SegmentFault 最新的问题
Jina AI
Jina AI

The Register - Security

Microsoft open-sources agentic AI safety tools Zombie user account let hackers control the city’s water Even Claude agrees: hole in its sandbox was real and dangerous GitHub says internal repos exfiltrated after poisoned VS Code extension attack London's police asked Big Tech for comms data over 700,000 times last year Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware America's top cyber-defense agency left a GitHub repo open with passwords, keys, tokens – and incredibly obvious filenames America's top cyber-defense agency left a GitHub repo open with with passwords, keys, tokens – and incredibly obvious filenames Clear your calendar, Drupal user: You have a critically urgent patch to install Clear your calendar, Drupal user: You have a critically urgent patch to install Do fear the Reaper - stealer swipes macOS users' passwords, wallets, then backdoors them Shai-Hulud copycat hits another npm package Linux kernel flaw opens root-only files to unprivileged users TanStack weighs invitation-only pull requests after supply chain attack NGINX Rift attackers waste no time targeting exposed servers Poland directs officials to ditch Signal in favor of 'secure' state-developed alternative F-35 software delays leave UK buying time with US glide bombs Mozilla warns UK: Breaking VPNs will not magically fix Britain's age-check mess Grafana Labs admits all its codebase are belong to someone who popped its GitHub account Linus Torvalds says AI-powered bug hunters have made Linux security mailing list ‘almost entirely unmanageable’ OpenAI caught in TanStack npm supply chain chaos after employee devices compromised MPs want social media treated more like unsafe toys than harmless apps Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data Cops arrest man suspected of being Dream Market kingpin Dirty Frag gets a sequel as Fragnesia hands Linux attackers root-level access To gain root access at this company, all an intruder had to do was ask nicely To gain root access at this company, all an intruder had to do was ask nicely AI models are getting better at replacing cybersecurity pros on certain tasks Cisco to fire 4,000 staff and generously give them free training – on Cisco Welcome to the vulnpocalypse, as vendors use AI to find bugs and patches multiply like rabbits AWS patched Quick auth bypass, says customers weren't using control AWS to Quick admins: The access control didn't work, but you weren't using it anyway, so what's the problem? Bug hunter tracks down three massive MCP flaws and one vendor won't fix theirs Disgruntled researcher releases two more Microsoft zero-days Malware crew TeamPCP open-sources its Shai-Hulud worm on GitHub Vietnam to develop domestic cloud so it can ditch risky overseas operators for government workloads Doozy of a Patch Tuesday includes 30 critical Microsoft CVEs Foxconn confirms cyberattack after Nitrogen claims Apple, Nvidia data theft US bank reports itself after AI customer data mishap Cache-poisoning caper turns TanStack npm packages toxic Apple, Google drag cross-platform texting into the encrypted age Japan’s PM orders cybersecurity review to stop Mythos going full CyberZilla Double Canvas breach acknowledged as ShinyHunters sets new pay-or-leak deadline Cookie thieves caught stealing dev secrets via fake Claude Code installers Anthropic’s bug-hunting Mythos was greatest marketing stunt ever, says cURL creator Best Western Hotels confirms web app data breach Checkmarx tackles another TeamPCP intrusion as Jenkins plugin sabotaged Checkmarx tackles another TeamPCP intrusion as Jenkins plugin sabotaged Taiwan's train cyber-trauma reveals a global system that’s coming off the tracks Worm rubs out competitor's malware, then takes control
思科又推出一个完美的10分漏洞,涉及Secure Workload管理缺陷
2026-05-21 · via The Register - Security
Switchzilla表示攻击者可以访问敏感数据并在租户边界之间进行配置更改…