出典: Securelist – https://securelist.com/bluenoroff-apt-campaigns-ghostcall-and-ghosthire/117842/ 原題: Cry...
出典: Schneier on Security – https://www.schneier.com/blog/archives/2025/10/first-wap-a-surveillance-compu...
出典: Schneier on Security – https://www.schneier.com/blog/archives/2025/10/louvre-jewel-heist.html 原題: Lo...
出典: Schneier on Security – https://www.schneier.com/blog/archives/2025/10/social-engineering-peoples-cre...
出典: Schneier on Security – https://www.schneier.com/blog/archives/2025/10/signals-post-quantum-cryptogra...
出典: Schneier on Security – https://www.schneier.com/blog/archives/2025/10/the-ai-designed-bioweapon-arms...
出典: SANS Internet Storm Center – https://isc.sans.edu/diary/rss/32428 原題: A phishing with invisible char...
出典: Krebs on Security – https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-recor...
出典: Krebs on Security – https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residentia...
出典: Graham Cluley – https://www.fortra.com/blog/cybercriminals-turn-each-other-story-lumma-stealers-coll...









