EUNO.NEWS EUNO.NEWS
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
  • All (20931) +237
    • AI (3154) +13
    • DevOps (932) +6
    • Software (11018) +167
    • IT (5778) +50
    • Education (48)
  • Notice
  • All (20931) +237
  • AI (3154) +13
  • DevOps (932) +6
  • Software (11018) +167
  • IT (5778) +50
  • Education (48)
  • Notice
Sources Tags Search
한국어 English 中文
  • 3 days ago · it

    S2W, CTI 기반 모의해킹 확대…‘인증’ 넘어 ‘실전 점검’으로

    빅데이터 분석 인공지능AI 기업 에스투더블유대표 서상덕, 이하 S2W는 사이버 위협 인텔리전스CTI 역량을 접목한 ‘모의해킹’ 사업을 확대하고 있다. 양종헌 S2W 오펜시브연구팀장은 모의해킹을 “미슐랭 3스타인증를 받은 식당이 훌륭한 식당인 건 맞지만, 그 사실만으로 위생 상태실제로 보...

    #penetration testing #CTI #cybersecurity #S2W #mock hacking #threat intelligence
  • 5 days ago · it

    SpyCloud Launches Supply Chain Solution to Combat Rising Third-Party Identity Threats

    Austin, TX / USA, 14th January 2026, CyberNewsWire...

    #SpyCloud #supply chain security #third‑party risk #identity threats #cybersecurity #threat intelligence
  • 5 days ago · it

    Inside Dark Web Monitoring: How Data Leaks Are Identified Responsibly

    !Cover image for Inside Dark Web Monitoring: How Data Leaks Are Identified Responsiblyhttps://media2.dev.to/dynamic/image/width=1000,height=420,fit=cover,gravit...

    #dark web monitoring #data leaks #cybersecurity #threat intelligence #security monitoring
  • 3 weeks ago · it

    Security news weekly round-up - 26th December 2025

    Stealth in Layers: Unmasking the Loader used in Targeted Email Campaigns Read the full articlehttps://cyble.com/blog/stealth-in-layers-unmasking-loader-in-targ...

    #cybersecurity #email security #phishing #malware #threat intelligence #cyber defense
  • 0 month ago · it

    MacSync Stealer variant finds a way to bypass Apple malware protections

    We’ve recently seen how ChatGPT was used to trick Mac users into installing MacStealer, and now a different tactic has been found to persuade users to install a...

    #macos #malware #cybersecurity #apple security #macsync stealer #malware bypass #threat intelligence
  • 1 month ago · it

    **Title:** Chinese Hacking Campaign Targets Vulnerable Cisco Customers: Understanding the Risks and Implications

    Introduction Researchers have revealed that hundreds of Cisco customers are vulnerable to a new Chinese hacking campaign. Cisco previously warned that Chinese...

    #Cisco #zero-day vulnerability #Chinese hacking campaign #cybersecurity #network security #threat intelligence #vulnerable customers
  • 1 month ago · it

    We pwned X, Vercel, Cursor, and Discord through a supply-chain attack

    markdown It's a wild world out there in tech these days, isn’t it? I mean, just when you think you’ve got your head around the latest and greatest development t...

    #supply-chain attack #cybersecurity #software security #X #Vercel #Discord #Cursor #threat intelligence
  • 1 month ago · it

    Cloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnets

    Welcome to the 23rd edition of Cloudflare’s Quarterly DDoS Threat Report. This report offers a comprehensive analysis of the evolving threat landscape of Distri...

    #DDoS #Cloudflare #botnets #cybersecurity #threat intelligence #Aisuru #Q3 2025
EUNO.NEWS
RSS GitHub © 2026