Aggregator
AI漏洞 MCP提示词注入POC
Crypto Market Outlook: How Crypto Will Come of Age in 2025
ИИ за секунду создал белок-убийцу. Цель — супербактерии, результат — ваше спасение
CVE-2023-33252 | iden3 snarkjs up to 0.6.11 publicSignals access control (EUVD-2023-1652)
CVE-2023-20883 | Oracle Communications Service Catalog and Design 7.4.0.7.0/7.4.1.5.0/7.4.2.8.0 PSR Designer denial of service (EUVD-2023-1651)
CVE-2020-21485 | Alluxio 1.8.1 Browse Board path cross site scripting (Issue 10552 / EUVD-2023-1661)
CVE-2023-20883 | Oracle Banking Payments up to 14.7 Core denial of service (EUVD-2023-1651)
CVE-2023-20883 | Oracle Banking Supply Chain Finance 14.5/14.6/14.7 Security denial of service (EUVD-2023-1651)
CVE-2023-20883 | Oracle Banking Trade Finance Process Management 14.5/14.6/14.7 Dashboard denial of service (EUVD-2023-1651)
CVE-2023-20883 | Oracle FLEXCUBE Universal Banking 14.5/14.6/14.7 Infrastructure denial of service (EUVD-2023-1651)
Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure
Threat actors have escalated their campaigns from crude ransomware splashes to precision-engineered strikes that can cripple an organisation’s very lifeblood—its operational technology. The latest malware strain, dubbed “BlackParagon” by incident responders, surfaced last week after simultaneous outages rippled across three Asian energy utilities. Initial telemetry shows infections began with a watering-hole compromise of an industry […]
The post Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure appeared first on Cyber Security News.
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-47812 Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
New White House cyber executive order pushes rules as code
Organizations must turn Cyber Governance, Risk, and Compliance (GRC) into executable pipelines, a Microsoft security product manager argues.
The post New White House cyber executive order pushes rules as code appeared first on CyberScoop.
Is XBOW’s success the beginning of the end of human-led bug hunting? Not yet.
XBOW’s AI bug-hunter landed a big funding round while dominating HackerOne’s leaderboards. But even its founder says it hasn’t fully replaced the need for humans to be involved in the bug-hunting process.
The post Is XBOW’s success the beginning of the end of human-led bug hunting? Not yet. appeared first on CyberScoop.
NIST Ion Clock Sets New Record for Most Accurate Clock in the World
NIST Shares Preliminary Findings From Hurricane Maria Investigation
Microsoft Explains How to Find and Stop Processes Blocking Files in Windows
Microsoft has provided comprehensive guidance on resolving one of Windows users’ most frustrating issues: the dreaded “The process cannot access the file because it is being used by another process” error message. This common problem occurs when multiple programs attempt to access the same file simultaneously, leaving users unable to delete, move, or modify important […]
The post Microsoft Explains How to Find and Stop Processes Blocking Files in Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.