Aggregator
CVE-2024-55073 | hay-kot Mealie 2.2.0 /api/users/{user-id} permission (Issue 4593)
CVE-2025-24382 | Dell Unity up to 5.4 os command injection (dsa-2025-116)
CVE-2024-49601 | Dell Unity up to 5.4 os command injection (dsa-2025-116)
CVE-2025-24381 | Dell Unity up to 5.4 redirect (dsa-2025-116)
CVE-2025-2894 | Unitree Go1 2022_05_11_e0d0e617 Access Service backdoor (ID 120)
CVE-2025-2885 | AWS tough up to 0.19.x Root Metatdata Version Number improper validation of consistency within input (GHSA-5vmp-m5v2-hx47)
CVE-2025-2887 | AWS tough up to 0.19.x Target Rollback comparison using wrong factors (GHSA-q6r9-r9pw-4cf7)
CVE-2025-2886 | AWS tough up to 0.19.x control flow (GHSA-v4wr-j3w6-mxqc)
Mozilla Patches Critical Firefox Bug Similar to Chrome’s Recent Zero-Day Vulnerability
CVE-2025-24383 | Dell Unity up to 5.4 os command injection (dsa-2025-116)
CVE-2025-28253 | MainWP Dashboard 5.3.4 class-mainwp-post-handler.php render_table sites/clients/search cross site scripting
CVE-2025-26890 | PluginUs Husky Plugin up to 1.3.6.4 on WordPress filename control
CVE-2025-22398 | Dell Unity up to 5.4 os command injection (dsa-2025-116)
Healthcare’s alarming cybersecurity reality
89% of healthcare organizations have the top 1% of riskiest Internet of Medical Things (IoMT) devices – which contain known exploitable vulnerabilities (KEVs) linked to active ransomware campaigns as well as an insecure connection to the internet – on their networks, according to Claroty. These figures represent a highly targeted, critical area where most security teams should prioritize their remediation efforts. The report is based on an analysis of over 2.25 million IoMT and 647,000 … More →
The post Healthcare’s alarming cybersecurity reality appeared first on Help Net Security.
Безопасность или свобода: камеры с распознаванием лиц разделили общество
Post-quantum cryptography and the future of online safety
In this Help Net Security video, Rebecca Krauthamer, CEO of QuSecure, explores the rising urgency of post-quantum cryptography (PQC) and what organizations must do to prepare. She breaks down the so-called “quantum threat” and explains why it’s not just theoretical. The real concern is the “Harvest Now, Decrypt Later” attack strategy, where adversaries collect encrypted data today to decrypt it once quantum computing capabilities mature. This video outlines why PQC is more than just a … More →
The post Post-quantum cryptography and the future of online safety appeared first on Help Net Security.