cyber security
-
Mantis: New tool used in attacks on Palestinian targets
Espionage groups invest time and effort in avoiding detection and persisting on compromised networks.
The Mantis cyber espionage group (aka Arid Viper, Desert Falcon, APT-C-23), a threat actor believed to operate within the Palestinian territories, is conducting ongoing attacks, deploying an updated toolset and sparing no effort in targeting targets. Maintain a persistent presence on the web.
The group is known for targeting organizations in the Middle East, but the recent activity discovered by Symantec, a subsidiary of Broadcom Software, is focused on organizations in the Palestinian territories. The malicious activity began in September 2022 and continued until at least February 2023. moon. This kind of targeting is not unprecedented for the Mantis group, which previously revealed attacks against individuals located in the Palestinian territories in 2017. -
Open source browser engine WebKit arbitrary file reading vulnerability
Google Chrome is a web browser developed by Google. It is based on an open source kernel (such as WebKit) and aims to improve stability, speed and security, with a simple and efficient interface. However, by using XSL stylesheets and external entity references in SVG image links, an attacker can read arbitrary files on the victim's computer.
-
Breaking News: National Data Administration discusses data infrastructure for the first time
Promote the construction of data infrastructure and contribute to the development of my country's data industry.
-
Practice and exploration of consumer personal information protection in takeaway business scenarios
With the rapid development and popularization of the digital economy, consumers' awareness of personal privacy protection in various consumption scenarios is also increasing. This article focuses on analyzing the high-frequency scenarios of personal privacy leakage in the food delivery industry and its governance measures. Taking the "Privacy Form", a consumer personal user privacy data protection plan under the "Consumer Personal Privacy Protection Special" on the Ele.me platform, as an example, we interpret the new model of user privacy data protection in the takeout scenario and analyze the entire business chain. The difficulty and feasibility of the road.
-
U.S. think tanks’ construction and enlightenment on my country’s cyber security issues
In today's globalized world, network security has become an important factor affecting national security. In recent years, the construction and enlightenment of China-related cybersecurity issues by Western think tanks has become an important research field. This article mainly analyzes the research results of six major American think tanks on China’s cyber security issues...
-
[Early Warning] Serious security vulnerabilities exposed in curl and libcurl libraries
Description: cURL is a widely used multi-functional open source command line tool that uses URL syntax to transmit data and supports a variety of network protocols including SSL, TLS, HTTP, FTP, and SMTP. libcurl is…
-
China Cyber Security Industry Analysis Report (2023)
"China Cybersecurity Industry Analysis Report (2023)" Contents 1. New Situation Facing 2. Basic Industry Situation 3. Enterprise Competitiveness and Industrial Structure 4. Capital Market Analysis 5. Industry Hotspot Analysis 6. Industry Development Outlook…
-
The Cyberspace Administration of China imposes penalties on CNKI for illegally handling personal information
On September 1, the Cyberspace Administration of China, in accordance with the Cybersecurity Law, the Personal Information Protection Law, the Administrative Penalty Law and other laws and regulations, comprehensively considered the nature, consequences, and duration of the illegal processing of personal information by CNKI, In particular, due to factors such as the network security review situation, CNKI made a decision on administrative penalties related to network security review in accordance with the law, ordered it to stop illegal processing of personal information, and imposed a fine of RMB 50 million.
-
Malicious AI tool FraudGPT is sold on the dark web, causing network security issues
With the rise of generative AI models, the threat landscape has changed dramatically. Now another hacker has created a malicious AI tool called FraudGPT, which is specifically used for attack purposes, such as making spear phishing emails, creating cracking tools, carding, etc. The tool is currently for sale on various darknet markets and Telegram platforms. It is said to be "capable of generating a variety of network attack codes" and "more than 3,000 buyers have placed orders in less than a week."
-
China's new development in the digital era, network security has entered a new era
Foreword The outbreak of the COVID-19 epidemic has accelerated the digital transformation process of the whole society, and industries such as remote office, online education, and online live broadcast have developed rapidly. With the advent of the digital economy era, emerging technologies such as cloud computing, big data, and the Internet of Things are deeply applied in various industries, and various industries are changing their production methods...