搜索优化
English
搜索
Copilot
图片
视频
地图
资讯
购物
更多
航班
旅游
酒店
笔记本
Top stories
Sports
U.S.
Local
World
Science
Technology
Entertainment
Business
More
Politics
时间不限
过去 1 小时
过去 24 小时
过去 7 天
过去 30 天
按相关度排序
按时间排序
The Hacker News
2 小时
Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations
APT groups from China, Iran, North Korea, and Russia use AI for cyber operations, phishing, and reconnaissance, raising ...
The Hacker News
2 小时
SOC Analysts - Reimagining Their Role Using AI
SOC analysts face alert fatigue and AI-driven threats. AI-powered SOCs automate triage and speed up response times.
The Hacker News
3 小时
DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked
DeepSeek AI exposed a database containing secret keys, chat logs, and backend data, allowing full system access.
The Hacker News
2 小时
Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown
Europol and seven nations seize Cracked, Nulled, Sellix, StarkRDP, disrupting cybercrime and malware networks.
The Hacker News
12 小时
New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks
Aquabot botnet exploits CVE-2024-41710 in Mitel phones, using a public PoC to deploy DDoS malware since January 2025.
The Hacker News
6 小时
Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter
Severe Lightning AI flaw (CVSS 9.4) enabled remote root execution via hidden URL parameter—patched post-October 2024 disclosure.
The Hacker News
11 小时
Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits
Three critical vulnerabilities in PHP Voyager allow remote code execution, XSS, and file deletion, with no patches since disclosure on September 11, 2 ...
The Hacker News
1 天
AI in Cybersecurity: What's Effective and What's Not – Insights from 200 Experts
Join Ravid Circus, a seasoned pro in cybersecurity and AI, as we peel back the layers of AI in cybersecurity through a ...
The Hacker News
1 天
Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
Lazarus Group’s Phantom Circuit hit 233 victims with trojanized software, using React and Node.js for control.
The Hacker News
1 天
How Interlock Ransomware Infects Healthcare Organizations
The Interlock ransomware group begins its attack with a strategic and highly deceptive method known as a Drive-by Compromise.
The Hacker News
1 天
Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer
VMware Avi Load Balancer flaw (CVE-2025-22217, CVSS 8.6) enables unauthenticated SQL injection. No workarounds exist—Broadcom ...
The Hacker News
1 天
New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits
SLAP & FLOP attacks exploit Apple M-series speculative execution flaws, leaking emails, location data, and credit cards via ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果
反馈