Aggregator
新型Mirai僵尸网络通过命令注入漏洞感染TBK DVR设备
CVE-2025-4229 | Palo Alto Cloud NGFW/PAN-OS/Prisma Access SD-WAN Interface exposure of sensitive system information to an unauthorized control sphere (EUVD-2025-18245)
CVE-2025-44091 | yangyouwang crud 1.0.0 Role Management cross site scripting (EUVD-2025-18209)
CVE-2025-4233 | Palo Alto Prisma Access Browser 132.83.3017.1 cache containing sensitive information
CVE-2025-27689 | Dell iDRAC Tools prior 11.3.0.0 access control (dsa-2025-169 / EUVD-2025-18220)
CVE-2025-4232 | Palo Alto GlobalProtect App up to 6.0.0/6.1.0/6.2.8-h1/6.3.2 Log Collection wildcards or matching symbols (Nessus ID 238432)
CVE-2025-4228 | Palo Alto Cortex XDR Broker VM up to 27.0.25 privileges assignment
CVE-2025-5491 | Acer ControlCenter up to 4.00.3056 Named Pipe privileges management (EUVD-2025-18228)
CVE-2025-49589 | pcsx2 up to 2.3.413 Disc Image Kprintf_HLE stack-based overflow (GHSA-f494-4xf7-xj35)
CVE-2025-41233 | VMware Avi Load Balancer up to 31.1.1-2p1 sql injection
CVE-2025-4230 | Palo Alto Cloud NGFW/PAN-OS/Prisma Access CLI os command injection (EUVD-2025-18226)
CVE-2025-41234 | VMware Spring Framework up to 6.0.28/6.1.20/6.2.7 org.springframework.http.ContentDisposition Content-Disposition response splitting
CVE-2025-4231 | Palo Alto Cloud NGFW/PAN-OS/Prisma Access prior 6.3.3 Management Web Interface command injection (EUVD-2025-18223)
谷歌CEO皮查伊两小时访谈:AI是人类所见过最深远的技术,意义将超越火与电,因为它可以自我迭代
Жизнь вируса после заражения: спойлер — она короткая и под надзором PT ESC
What CISOs need to know about agentic AI
GenAI has been the star of the show lately. Tools like ChatGPT impressed everyone with how well they can summarize, write, and respond. But something new is gaining ground: agentic AI. These systems don’t just answer questions. They make decisions, take action, and in some cases, even work together to get things done. Naturally, CISOs are starting to ask the big question: can we trust it to be secure? Agentic AI has the potential to … More →
The post What CISOs need to know about agentic AI appeared first on Help Net Security.
2 часа 28 минут без ключевых сервисов: как сбой Google Cloud ударил по миру
Security flaws in government apps go unpatched for years
78% of public sector organizations are operating with significant security debt, flaws left unaddressed for more than a year, according to Veracode. 55% are burdened with ‘critical’ security debt, representing long-standing vulnerabilities with severe risk potential. Public sector flaw remediation timeline based on survival analysis (Source: Veracode) Public sector security debt exceeds industry average The research reveals that public sector entities require an average of 315 days to fix half their software vulnerabilities, significantly higher … More →
The post Security flaws in government apps go unpatched for years appeared first on Help Net Security.