Aggregator
CVE-2026-23231 | Linux Kernel up to 6.1.164/6.6.127/6.12.74/6.18.13/6.19.3 netfilter nf_tables_addchain use after free
Диагнозы, долги и аборты: что нашли в базах данных, куда стекаются ваши промпты для ИИ
Groups Push Back on HHS' Proposed Health IT Rollbacks
Proposals to eliminate certain longstanding health IT certification criteria - including privacy and security related controls - will shift regulatory burden from health IT developers to healthcare providers, some industry groups contend in their public response to proposed federal rulemaking.
Startup JetStream Secures $34M Seed Round for AI Governance
JetStream has raised $34 million in seed funding to tackle enterprise AI governance challenges. The startup introduced blueprint-based controls to manage shadow AI, MCP servers and token-level spending while helping CISOs gain visibility and enforce guardrails across cloud and SaaS environments.
Juniper PTX Routers at Risk, Critical Takeover Flaw Disclosed
A critical vulnerability in Juniper Networks' primary operating system could give threat actors root level privileges to execute code on Juniper’s PTX Series routers. Successful exploitation would give attackers full command and control over devices without the need for authentication.
DragonForce
You must login to view this content
Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses
Shadow AI: When Everyone Becomes a Data Leak Waiting to Happen
Shadow AI leaks data to uncontrolled external systems and spreads virally across organizations, requiring user training and compliant alternatives rather than prohibition.
The post Shadow AI: When Everyone Becomes a Data Leak Waiting to Happen appeared first on Security Boulevard.
Астероид бьёт по планете — микробы улетают в космос живыми. Проверили на бактериях: 60% выжили при ударе
CVE-2025-10891
CVE-2025-7544
CVE-2025-64328
Кибервоины в «высшей лиге». Пентагон официально признал участие хакеров в ударах по Ирану
Qilin
You must login to view this content
Qilin
You must login to view this content
Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge
From phishing to Google Drive C2: Silver Dragon expands APT41 playbook
Cyber Defense Magazine | A New Bell Rings For K-12 Cloud Security After the Illuminate Settlement
This article was originally published in Cyber Defense Magazine on 02/09/26 by Charlie Sander. The Illuminate incident serves as a crucial reminder to edtech vendors of the potential backlash that can occur when privacy promises are not upheld In a recent complaint, the FTC addresses Illuminate Education’s need to strengthen its data security after a breach ...
The post Cyber Defense Magazine | A New Bell Rings For K-12 Cloud Security After the Illuminate Settlement appeared first on ManagedMethods Cybersecurity, Safety & Compliance for K-12.
The post Cyber Defense Magazine | A New Bell Rings For K-12 Cloud Security After the Illuminate Settlement appeared first on Security Boulevard.