Aggregator
CVE-2025-47539
CVE-2025-21836
CVE-2024-35880
CVE-2024-0582
CVE-2025-21297
CVE-2024-54492
CVE-2025-4919
CVE-2025-4918
CVE-2025-4664
CVE-2025-24203
【深度剖析】2025年中亚安全格局:一场暗流涌动的博弈
如何建立一个人的社交图谱与行为画像
На коробке написано «VPN и защита», внутри — перехват куки, фальшивые DOM-элементы и доступ ко всем вкладкам браузера
内核提权二
AutoPatchBench: Meta’s new way to test AI bug fixing tools
AutoPatchBench is a new benchmark that tests how well AI tools can fix code bugs. It focuses on C and C++ vulnerabilities found through fuzzing. The benchmark includes 136 real bugs and their verified fixes, taken from the ARVO dataset. Patch generation flowchart CyberSecEval 4 AutoPatchBench is part of Meta’s CyberSecEval 4, a benchmark designed to objectively evaluate and compare various LLM-based auto-patching agents for vulnerabilities specifically identified via fuzzing, a widely used method of … More →
The post AutoPatchBench: Meta’s new way to test AI bug fixing tools appeared first on Help Net Security.
Тысячи школ, миллионы жертв и один 19-летний студент: задержан виновник взлома PowerSchool
Third-party cyber risks and what you can do
When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director of Security and IT at Blumira, explores why visibility into your vendor ecosystem is essential: from understanding which vendors you use and what data they access, to how they protect it. Learn how to build third-party … More →
The post Third-party cyber risks and what you can do appeared first on Help Net Security.
Nation-state APTs ramp up attacks on Ukraine and the EU
Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. Gamaredon remained the most prolific actor targeting Ukraine, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox. “The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it … More →
The post Nation-state APTs ramp up attacks on Ukraine and the EU appeared first on Help Net Security.