Aggregator
Substack 曝数据泄露事件,此前黑客已在论坛公开用户数据
金融科技公司 Betterment 发生数据泄露,140 万用户账户信息受影响
亲俄黑客组织对 2026 年冬奥会发起 DDoS 攻击
Submit #746520: PHPgurukul Beauty Parlour Management System V1.1 SQL Injection [Accepted]
Submit #746510: SourceCodester Online Class Record System 1.0 SQL Injection [Accepted]
Submit #746502: UTT (AiTai) HiPER 810G <= v3v1.7.7-171114 Buffer Overflow [Accepted]
MintMCP’s governance platform helps organizations deploy, monitor, and secure AI agents
MintMCP launched its enterprise governance platform for AI agents and MCP servers, enabling teams to deploy, monitor, and secure agent infrastructure at scale. The platform enables organizations to deploy, monitor, and secure AI agents at scale while maintaining complete audit trails and policy enforcement. As enterprises race to deploy AI agents, security teams face a growing blind spot. These agents operate with elevated privileges: accessing databases, APIs, and internal systems. At the same time, most … More →
The post MintMCP’s governance platform helps organizations deploy, monitor, and secure AI agents appeared first on Help Net Security.
CVE-2026-2084 | D-Link DIR-823X 250416 /goform/set_language langSelection os command injection
Submit #746400: D-Link DWR-M921 V1.1.50 Command Injection [Accepted]
Submit #746399: PHPgurukul Hospital Management System V4.0 SQL Injection [Duplicate]
Submit #746380: D-Link DIR-823X 250416 OS Command Injection [Duplicate]
Submit #746379: D-Link DIR 250416 OS Command Injection [Accepted]
CVE-2026-2083 | code-projects Social Networking Site 1.0 /delete_post.php ID sql injection
CVE-2026-2082 | D-Link DIR-823X 250416 /goform/set_mac_clone mac os command injection
CVE-2026-2081 | D-Link DIR-823X 250416 /goform/set_password http_passwd os command injection
Eradicating trivial vulnerabilities, at scale
Thanking the vulnerability research community with NCSC Challenge Coins
Why Attackers no Longer Need to Break in: The Rise of Identity-Based Attacks
In 2026 stolen credentials and unmanaged machine identities drive breaches—small buys, phone scams, and weak IAM make identity the real perimeter; prioritize inventory, least privilege, and stronger auth.
The post Why Attackers no Longer Need to Break in: The Rise of Identity-Based Attacks appeared first on Security Boulevard.