Walking Ideological and Political Course: IoT College Organizes ‘Visit to Cybersecurity Exhibition, Forge Skills for National Service’ Practical Activity

Walking Ideological and Political Course: IoT College Organizes 'Visit to Cybersecurity Exhibition, Forge Skills for National Service' Practical Activity

On June 20, 2025, the IoT College organized a group of 29 students who will participate in the network operation and maintenance of the venues for the 2025 Chengdu World Games to visit the China Cybersecurity Science and Technology Museum for a specialized study activity. This study activity focused on the theme of “Focusing on … Read more

The ‘Godfather’ Android Trojan Uses Virtualization Technology to Hijack Banking and Cryptocurrency Applications

The 'Godfather' Android Trojan Uses Virtualization Technology to Hijack Banking and Cryptocurrency Applications

Zimperium zLabs has discovered a significant upgraded version of the “Godfather” Android Trojan, which utilizes device-side virtualization technology to hijack real banking and cryptocurrency applications. Unlike traditional fake interface overlays, this malware creates a sandbox environment on the victim’s device, running real applications and capturing user input in real-time. This technology enables complete account takeover … Read more

TARA Analysis of In-Vehicle Infotainment Systems

TARA Analysis of In-Vehicle Infotainment Systems

Source: Niuka Network Abstract In modern vehicles, high-performance computing (HPC) systems for infotainment play a crucial role in enhancing the experience of drivers and passengers by providing advanced features such as music, navigation, communication, and entertainment. This system utilizes technologies such as Wi-Fi, cellular networks, NFC, and Bluetooth to ensure continuous internet connectivity for information … Read more

7 Major Artificial Intelligence Technology Trends to Watch in 2023

7 Major Artificial Intelligence Technology Trends to Watch in 2023

Introduction: Artificial Intelligence (AI) has taken over the world and will continue to advance in 2023. In 2023, it will fully realize automation in supply chains, virtual assistants, and various other products and forms. The world is currently experiencing a wave of AI-driven global economic transformation. Currently, AI technology has made significant progress in almost … Read more

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

Risk Alert on the Large-Scale Spread of Mirai Variant Botnets

This report is jointly released by the National Internet Emergency Center (CNCERT) and Qihoo 360 Technology Co., Ltd. (Qihoo 360). 1 Overview Recently, CNCERT and Qihoo 360 have jointly monitored the emergence of a new DDoS botnet that is rapidly spreading on the internet. Tracking and monitoring have revealed that the number of domestic compromised … Read more

Popular Chrome Extensions Expose Dual Vulnerabilities of HTTP and Hardcoded Keys

Popular Chrome Extensions Expose Dual Vulnerabilities of HTTP and Hardcoded Keys

Source: Security Circle Cybersecurity researchers have discovered serious security vulnerabilities in several popular Google Chrome extensions: transmitting data over HTTP in plaintext and hardcoding keys in the code, putting user privacy and security at risk. Symantec’s Security Technology Response Team researcher pointed out: “Several widely used extensions transmit sensitive data via unencrypted HTTP protocols, exposing … Read more

21.9% of Global Industrial Control Systems Attacked in Q1, Internet Emerges as Primary Threat Source

21.9% of Global Industrial Control Systems Attacked in Q1, Internet Emerges as Primary Threat Source

The latest report released by Kaspersky ICS CERT on June 10 indicates that in the first quarter of 2025, 21.9% of global Industrial Control System (ICS) computers encountered malicious object attacks, a figure that remains stable compared to the previous quarter. The report emphasizes that the internet has become the primary source of threats to … Read more

To the 30-Year-Old PLC Engineer in Confusion: Four High-Paying Career Transition Directions You Must Understand Before It’s Too Late!

To the 30-Year-Old PLC Engineer in Confusion: Four High-Paying Career Transition Directions You Must Understand Before It's Too Late!

To the 30-Year-Old PLC Engineer in Confusion: Four High-Paying Career Transition Directions You Must Understand Before It’s Too Late! Last night at 11 PM, I was debugging equipment in the control room of a chemical plant when my phone suddenly rang. It was a younger colleague I had mentored, his voice filled with anxiety: “Master, … Read more

New Trojan Based on Rust Language Targets Chromium-Based Browsers for Data Theft

New Trojan Based on Rust Language Targets Chromium-Based Browsers for Data Theft

Recently, researchers discovered a new type of information-stealing malware written inRust that can extract sensitive data fromChromium-based andGecko-based web browsers. Part01 Overview of the Malware Situation This malware, namedMyth Stealer, represents a significant evolution in cybercriminal strategies, combining modern programming techniques with traditional social engineering methods to steal user credentials and financial information. Sincelate December … Read more

How to Identify Hidden Processes in Linux? An Analysis of Common Hacker Techniques and Detection Methods

How to Identify Hidden Processes in Linux? An Analysis of Common Hacker Techniques and Detection Methods

In the field of cybersecurity, attackers often employ various techniques to hide processes in order to conceal their malicious activities. This article provides an in-depth analysis of how hackers hide processes and how to detect hidden processes, combining practical cases and public information. 1. Revealing Common Process Hiding Techniques Used by Hackers (1) Tool Tampering … Read more