Aggregator
CVE-2025-57622 | Step-Video-T2V /vae-api get_data deserialization
CVE-2026-2637 | iBoysoft NTFS 8.0.0 on macOS NSConnection Service permission assignment
CVE-2025-64736 | Biosig libbiosig 3.9.2 ABF Parser out-of-bounds (TALOS-2025-2323)
CVE-2026-28518 | Volcengine OpenViking up to 0.2.1 path traversal (46b3e76)
CVE-2026-25674 | djangoproject Django up to 4.2.28/5.2.11/6.0.2 File-System Backend race condition
Weekly Threat Bulletin – March 4th, 2026
CVE-2026-22891 | Biosig libbiosig 3.9.2 Intan CLP Parser heap-based overflow (TALOS-2026-2361)
CVE-2026-20777 | Biosig libbiosig 3.9.2 Nicolet WFT Parser heap-based overflow (TALOS-2026-2362)
CVE-2025-52365 | ccurtsinger stabilizer Command-Line Argument os.system command injection
CVE-2026-25673 | Django up to 4.2.28/5.2.11/6.0.2 on Windows NFKC Normalization urllib.parse.urlsplit resource consumption
AI 生成的作品不受版权保护
Nieuwe onderzeeboten direct voorzien van geavanceerde torpedo
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
Колонизаторы, ликуйте. Дышать на Луне станет проще: NASA научилась делать кислород из реголита с помощью света
Josys centralizes identity data to replace manual IT oversight with automated governance
Josys has transitioned into an autonomous identity governance platform, expanding beyond traditional SaaS management. The enhanced platform empowers IT leaders and managed service providers (MSPs) to scale governance and compliance efforts by centralizing identity data within a single, AI-driven system. With Verizon reporting that 80% of hacking breaches stem from compromised credentials, identity is the ultimate attack surface. As threats and costly non-compliance penalties surge, organizations can no longer rely on manual IT oversight. Autonomous … More →
The post Josys centralizes identity data to replace manual IT oversight with automated governance appeared first on Help Net Security.
$100 radio equipment can track cars through their tire sensors
When people consider what might track their movements, they think of smartphone apps, GPS services, or roadside cameras. The tires of a new car rarely enter that equation. Researchers at IMDEA Networks Institute, together with European partners, found that Tire Pressure Monitoring System (TPMS) sensors inside each wheel broadcast unencrypted wireless signals containing persistent identifiers. Each sensor sends out a unique ID that does not change, allowing the same car to be recognized again and … More →
The post $100 radio equipment can track cars through their tire sensors appeared first on Help Net Security.