Aggregator
What happens when penetration testing goes virtual and gets an AI coach
Cybersecurity training often struggles to match the complexity of threats. A new approach combining digital twins and LLMs aims to close that gap. Researchers from the University of Bari Aldo Moro propose using Cyber Digital Twins (CDTs) and generative AI to create realistic, interactive environments for cybersecurity education. Their framework simulates IT, OT, and IoT systems in a controlled virtual space and layers AI-driven feedback on top. The goal is to improve penetration testing skills … More →
The post What happens when penetration testing goes virtual and gets an AI coach appeared first on Help Net Security.
Как управлять уязвимостями без хаоса: функциональность сканера Security Vision в деталях. 28 августа, начало в 11:00
fortiweb-未授权RCE(CVE-2025-25257)
CVE-2025-9140 | Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7 tabdetail_moduleSave.php getvaluestring sql injection
Submit #628435: Portabilis i-Educar 2.10 Cross Site Scripting [Duplicate]
CVE-2025-9139 | Scada-LTS 2.7.8.1 WatchListDwr.init.dwr information disclosure
CVE-2025-9138 | Scada-LTS 2.7.8.1 pointHierarchy/new/ Title cross site scripting
CVE-2025-9137 | Scada-LTS 2.7.8.1 scheduled_events.shtm alias cross site scripting
Submit #628192: China ShangHai Lingdang Information Technology Co., Ltd Lingdang CRM <= V8.6.5.2.23 SQL Injection [Duplicate]
Submit #628087: Shanghai Lingdang Information Technology Lingdang CRM ≤V8.6.4.3 SQL Injection [Accepted]
Hackers Exploit Cisco Secure Links to Evade Link Scanners and Bypass Network Filters
A sophisticated attack campaign uncovered where cybercriminals are weaponizing Cisco’s own security infrastructure to conduct phishing attacks. The attackers are exploiting Cisco Safe Links technology, designed to protect users from malicious URLs, to evade detection systems and bypass network filters by leveraging the trust associated with Cisco’s security brand. Key Takeaways1. Attackers use legitimate Cisco […]
The post Hackers Exploit Cisco Secure Links to Evade Link Scanners and Bypass Network Filters appeared first on Cyber Security News.
Submit #621062: SCADA-LTS Scada-LTS 2.7.8.1 Exposure of Private Personal Information to an Unauthorized Acto [Accepted]
Submit #620516: Scada-LTS 2.7.8.1 Cross Site Scripting [Accepted]
Submit #620487: Scada-LTS 2.7.8.1 Cross Site Scripting [Accepted]
CVE-2025-9136 | libretro RetroArch 1.18.0/1.19.0/1.20.0 file_stream.c filestream_vscanf out-of-bounds (ID 17555)
Хакерский журнал рассекретил методы северокорейской APT-группировки. След идёт от самого Пхеньяна
Submit #617657: libretro RetroArch v1.20.0/v1.19.0/v1.18.0 Out-of-Bounds Read [Accepted]
As AI grows smarter, your identity security must too
AI is no longer on the horizon, it’s already transforming how organizations operate. In just a few years, we’ve gone from isolated pilots to enterprise-wide adoption. According to a recent SailPoint survey, 82% of companies are running AI agents today, often across multiple business functions. These agents aren’t just passive tools; they’re autonomous systems that act, decide, and adapt at remarkable speed and scale. These systems now handle responsibilities once reserved for skilled human oversight, … More →
The post As AI grows smarter, your identity security must too appeared first on Help Net Security.