■■■□□ اخبار امنیت سازمانی
Workday Data Breach Bears Signs of Widespread Salesforce Hack
منبع خبر: SecurityWeek
🔗 مشاهده خبر
Workday Data Breach Bears Signs of Widespread Salesforce Hack
منبع خبر: SecurityWeek
🔗 مشاهده خبر
SecurityWeek
Workday Data Breach Bears Signs of Widespread Salesforce Hack
Workday appears to have joined the list of major companies that had their Salesforce instances targeted by hackers.
■■■□□ تحلیل و سیاستگذاری امنیت
Eavesdropping on Phone Conversations Through Vibrations
منبع خبر: Schneier on Security
🔗 مشاهده خبر
Eavesdropping on Phone Conversations Through Vibrations
منبع خبر: Schneier on Security
🔗 مشاهده خبر
Schneier on Security
Eavesdropping on Phone Conversations Through Vibrations - Schneier on Security
Researchers have managed to eavesdrop on cell phone voice conversations by using radar to detect vibrations. It’s more a proof of concept than anything else. The radar detector is only ten feet away, the setup is stylized, and accuracy is poor. But it’s a…
■■■□□ اخبار امنیت سایبری ایران
درخواست تعلیق فعالیتهای صنفی تا مشخص شدن نتایج بررسیها و شکایات
منبع خبر: افتانا aftana
🔗 مشاهده خبر
درخواست تعلیق فعالیتهای صنفی تا مشخص شدن نتایج بررسیها و شکایات
منبع خبر: افتانا aftana
🔗 مشاهده خبر
AFTANA.ir
درخواست تعلیق فعالیتهای صنفی تا مشخص شدن نتایج بررسیها و شکایات
سازمان نظام صنفی رایانهای استان تهران دومین بیانیه خود را درباره شفافسازی پیرامون اخبار منتشر شده در خصوص یکی از اعضای هیئتمدیره منتشر کرد.
■■■□□ اخبار جامع امنیت
Defending Against Cloud Threats Across Multi-Cloud Environments
منبع خبر: Dark Reading
🔗 مشاهده خبر
Defending Against Cloud Threats Across Multi-Cloud Environments
منبع خبر: Dark Reading
🔗 مشاهده خبر
Dark Reading
Defending Against Cloud Threats Across Multicloud Environments
The vast majority of companies are using more than one cloud platform, yet struggle to establish and monitor security across different environments giving attackers an opening.
■■■□□ اکسپلویت جدید
[remote] Tenda AC20 16.03.08.12 - Command Injection
منبع خبر: Exploit-DB
🔗 مشاهده خبر
[remote] Tenda AC20 16.03.08.12 - Command Injection
منبع خبر: Exploit-DB
🔗 مشاهده خبر
Exploit Database
Tenda AC20 16.03.08.12 - Command Injection
Tenda AC20 16.03.08.12 - Command Injection. CVE-2025-9090 . remote exploit for Multiple platform
■■■□□ حریم خصوصی
How to Find and Remove 'Stalkerware' From Your Phone
منبع خبر: Lifehacker Privacy
🔗 مشاهده خبر
How to Find and Remove 'Stalkerware' From Your Phone
منبع خبر: Lifehacker Privacy
🔗 مشاهده خبر
Lifehacker
How to Find and Remove 'Stalkerware' From Your Phone
While your mobile device has a lot of built-in features to keep your data secure and protect your privacy, it may still be vulnerable to spying if someone you know has access to your accounts or manages to install hidden apps—known as stalkerware—that track…
■■■□□ news
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
Cyber Security News
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities
Over 1,000 exposed and unpatched N-able N-central Remote Monitoring and Management (RMM) servers vulnerable to two newly disclosed zero-day vulnerabilities – CVE-2025-8875 and CVE-2025-8876.
❌ هشدار امنیتی تازه!
چندین برنامهٔ فیلترشکن در فروشگاه گوگلپلی پیدا شده که همه با یک گذرواژهٔ ثابت و از پیشنوشته برای پروتکل شادوساکس عرضه شدهاند!
🔓 این یعنی مالکان این برنامهها میتوانند بهراحتی به محتوای ترافیک اینترنتی کاربران دسترسی داشته باشند.
📡 به گفتهٔ «سیتیزنلب»، این برنامهها در ظاهر به نام سه شرکت صوری ثبت شدهاند، اما در عمل از چین مدیریت میشوند.
❗️ اگر امنیت و حریم خصوصی برایتان اهمیت دارد، همین حالا فیلترشکنی رو که استفاده میکنید دوباره چک کنید.
لینک از x (داود سجادی)
چندین برنامهٔ فیلترشکن در فروشگاه گوگلپلی پیدا شده که همه با یک گذرواژهٔ ثابت و از پیشنوشته برای پروتکل شادوساکس عرضه شدهاند!
🔓 این یعنی مالکان این برنامهها میتوانند بهراحتی به محتوای ترافیک اینترنتی کاربران دسترسی داشته باشند.
📡 به گفتهٔ «سیتیزنلب»، این برنامهها در ظاهر به نام سه شرکت صوری ثبت شدهاند، اما در عمل از چین مدیریت میشوند.
❗️ اگر امنیت و حریم خصوصی برایتان اهمیت دارد، همین حالا فیلترشکنی رو که استفاده میکنید دوباره چک کنید.
لینک از x (داود سجادی)
■■■□□ اخبار و آسیبپذیریها
⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
منبع خبر: The Hacker News
🔗 مشاهده خبر
⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
منبع خبر: The Hacker News
🔗 مشاهده خبر
■■■□□ هشدار امنیتی
Trend Micro Apex One OS Command Injection Vulnerability - undefined
منبع خبر: CISA Alerts
🔗 مشاهده خبر
Trend Micro Apex One OS Command Injection Vulnerability - undefined
منبع خبر: CISA Alerts
🔗 مشاهده خبر
Cybersecurity and Infrastructure Security Agency CISA
Known Exploited Vulnerabilities Catalog | CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the…
■■■□□ news
New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
Cyber Security News
New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay
Ghost-tapping, an NFC relay fraud, lets cybercriminals exploit stolen cards via mobile wallets for undetectable in-store purchases.
■■■□□ News
⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
منبع خبر: TheHackersNews
🔗 مشاهده خبر
⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
منبع خبر: TheHackersNews
🔗 مشاهده خبر
■■■□□ اخبار جامع امنیت
How Evolving RATs Are Redefining Enterprise Security Threats
منبع خبر: Dark Reading
🔗 مشاهده خبر
How Evolving RATs Are Redefining Enterprise Security Threats
منبع خبر: Dark Reading
🔗 مشاهده خبر
Dark Reading
How Evolving RATs Are Redefining Enterprise Security Threats
A more unified and behavior-aware approach to detection can significantly improve security outcomes.
■■■□□ hackday
The Terminal Demise of Consumer Electronics Through Subnoscription Services
منبع خبر: hackday
🔗 مشاهده خبر
The Terminal Demise of Consumer Electronics Through Subnoscription Services
منبع خبر: hackday
🔗 مشاهده خبر
Hackaday
The Terminal Demise Of Consumer Electronics Through Subnoscription Services
Open any consumer electronics catalog from around the 1980s to the early 2000s and you are overwhelmed by a smörgåsbord of devices, covering any audio-visual and similar entertainment and hobby nee…
■■■□□ news
Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
Cyber Security News
Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
Bragg Gaming Group has confirmed a significant cybersecurity incident that compromised the company's internal IT infrastructure early Saturday morning, August 16, 2025.
■■■□□ روزنامهنگاری امنیت سایبری
Cryptomining group Kinsing expands operations to Russia, researchers warn
منبع خبر: The Record
🔗 مشاهده خبر
Cryptomining group Kinsing expands operations to Russia, researchers warn
منبع خبر: The Record
🔗 مشاهده خبر
therecord.media
Cryptomining group Kinsing expands operations to Russia, researchers warn
Russia-based cybersecurity firm F6 said the attacks began in April and infected devices with Kinsing and XMRig malware, tools commonly used to mine the cryptocurrency Monero.
■■■□□ امنیت سایبری و بدافزار
Mozilla warns Germany could soon declare ad blockers illegal
منبع خبر: Bleeping Computer
🔗 مشاهده خبر
Mozilla warns Germany could soon declare ad blockers illegal
منبع خبر: Bleeping Computer
🔗 مشاهده خبر
BleepingComputer
Mozilla warns Germany could soon declare ad blockers illegal
A recent ruling from Germany's Federal Supreme Court (BGH) has revived a legal battle over whether browser-based ad blockers infringe copyright, raising fears about a potential ban of the tools in the country.
■■■□□ news
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data
منبع خبر: cybersecuritynews
🔗 مشاهده خبر
Cyber Security News
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data
A series of critical vulnerabilities across multiple internal Intel websites allowed for the complete exfiltration of the company's global employee database and access to confidential supplier information.
■■■□□ اخبار امنیت سازمانی
Novel 5G Attack Bypasses Need for Malicious Base Station
منبع خبر: SecurityWeek
🔗 مشاهده خبر
Novel 5G Attack Bypasses Need for Malicious Base Station
منبع خبر: SecurityWeek
🔗 مشاهده خبر
SecurityWeek
Novel 5G Attack Bypasses Need for Malicious Base Station
Researchers detailed a new 5G attack named Sni5Gect that can allow attackers to sniff traffic and cause disruption.