Aggregator
When Routine Activity Isn’t Routine: Detecting Modern Attacks Faster
1 week 2 days ago
'Plug-and-Play' AI Is a Myth for Enterprises
1 week 2 days ago
CIOs Face Integration, Talent and ROI Hurdles Despite Rising AI Budgets
CIOs looking for quick wins from AI may be out of luck. The real value from AI won't come from plug-and-play tools that can be bought, but rather from the hard work of integrating AI into enterprise systems, workflows and operating models, according to new research from Cognizant.
CIOs looking for quick wins from AI may be out of luck. The real value from AI won't come from plug-and-play tools that can be bought, but rather from the hard work of integrating AI into enterprise systems, workflows and operating models, according to new research from Cognizant.
Medtech Firm Stryker Disrupted by Pro-Iran Hackers
1 week 2 days ago
Iran Expands Targeting, Including AWS, Google and Microsoft Infrastructure
Michigan-based medical technology giant Stryker appears to have been hacked by a pro-Iranian group called Handala, leading to global operations being disrupted, IT devices remotely wiped and terabytes of data being stolen. Experts said Handala appears to be a "faketivist" group run by Tehran.
Michigan-based medical technology giant Stryker appears to have been hacked by a pro-Iranian group called Handala, leading to global operations being disrupted, IT devices remotely wiped and terabytes of data being stolen. Experts said Handala appears to be a "faketivist" group run by Tehran.
Kai Launches Agentic AI Security Platform With $125M Funding
1 week 2 days ago
Startup Platform Targets Autonomous Detection and Exposure Management
Cybersecurity startup Kai emerged from stealth with $125 million in funding led by Evolution Equity to develop an agentic AI platform that automates exposure management, threat intelligence, analysis and detection workflows while helping security teams remediate vulnerabilities faster.
Cybersecurity startup Kai emerged from stealth with $125 million in funding led by Evolution Equity to develop an agentic AI platform that automates exposure management, threat intelligence, analysis and detection workflows while helping security teams remediate vulnerabilities faster.
Armadin Launches With $190M to Automate Red-Teaming With AI
1 week 2 days ago
Vendor Combines AI Attack Agents, Human Experts to Simulate Real-World Cyberattacks
Offensive security startup Armadin secured nearly $190 million in funding to expand a platform that uses AI agents to automate red-team operations. The technology enables companies to continuously test defenses and uncover attack paths that traditional consulting engagements often miss.
Offensive security startup Armadin secured nearly $190 million in funding to expand a platform that uses AI agents to automate red-team operations. The technology enables companies to continuously test defenses and uncover attack paths that traditional consulting engagements often miss.
大规模机器身份管理:风险、差距与安全未来
1 week 2 days ago
马化腾凌晨发声:腾讯还有一批“龙虾系”产品陆续赶来;英伟达宣布投入 260 亿美元打造开源模型;小伙手搓悬停火箭火爆全网|极客早知道
1 week 2 days ago
腾讯董事会主席兼首席执行官马化腾今天凌晨 2 时许在朋友圈转发了腾讯推出全系「龙虾」产品矩阵的公众号文章,并配文「自研龙虾、本地虾、云端虾、企业虾、云桌面虾,安全隔离虾房、云保安、知识库…… 还有一批产品陆续赶来」。
CVE-2026-27727 | swaldman mchange-commons-java up to 0.3.x injection (Nessus ID 301811 / WID-SEC-2026-0694)
1 week 2 days ago
A vulnerability described as problematic has been identified in swaldman mchange-commons-java up to 0.3.x. This affects an unknown part. Executing a manipulation can lead to injection.
This vulnerability is registered as CVE-2026-27727. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-27900 | linode terraform-provider-linode up to 3.8.x log file (GHSA-5rc7-2jj6-mp64)
1 week 2 days ago
A vulnerability labeled as problematic has been found in linode terraform-provider-linode up to 3.8.x. Affected by this vulnerability is an unknown functionality. The manipulation results in sensitive information in log files.
This vulnerability is reported as CVE-2026-27900. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2026-28795 | zhongyu09 openchatbi up to 0.2.1 save_report.py file_format path traversal
1 week 2 days ago
A vulnerability categorized as critical has been discovered in zhongyu09 openchatbi up to 0.2.1. This issue affects some unknown processing of the file openchatbi/tool/save_report.py. Such manipulation of the argument file_format leads to path traversal.
This vulnerability is traded as CVE-2026-28795. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28800 | NatroTeam NatroMacro up to 1.0.x Send Message path traversal (GHSA-ph9r-2qjm-ghvg / EUVD-2026-10007)
1 week 2 days ago
A vulnerability classified as critical has been found in NatroTeam NatroMacro up to 1.0.x. The impacted element is an unknown function of the component Send Message Handler. This manipulation causes path traversal.
This vulnerability is handled as CVE-2026-28800. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-28801 | NatroTeam NatroMacro up to 1.0.x code injection (GHSA-c5gm-vfvf-pwhx / EUVD-2026-10008)
1 week 2 days ago
A vulnerability classified as critical was found in NatroTeam NatroMacro up to 1.0.x. This affects an unknown function. Such manipulation leads to code injection.
This vulnerability is uniquely identified as CVE-2026-28801. Local access is required to approach this attack. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-28799 | pjsip pjproject up to 2.16 evsub.c use after free (GHSA-8fj4-fv9f-hjpc / EUVD-2026-10006)
1 week 2 days ago
A vulnerability, which was classified as critical, has been found in pjsip pjproject up to 2.16. This impacts an unknown function of the file evsub.c. Performing a manipulation results in use after free.
This vulnerability was named CVE-2026-28799. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-28438 | cocoindex-io cocoindex up to 0.3.33 sql injection (GHSA-59g6-v3vg-f7wc)
1 week 2 days ago
A vulnerability was found in cocoindex-io cocoindex up to 0.3.33. It has been classified as critical. This affects an unknown part. This manipulation causes sql injection.
This vulnerability is tracked as CVE-2026-28438. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-29038 | dgtlmoon changedetection.io up to 0.54.3 HTTP Response /rss/tag/ cross site scripting (GHSA-8whx-v8qq-pq64)
1 week 2 days ago
A vulnerability labeled as problematic has been found in dgtlmoon changedetection.io up to 0.54.3. The impacted element is an unknown function of the file /rss/tag/ of the component HTTP Response Handler. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-29038. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2025-40926 | KAZEBURO Plack::Middleware::Session::Simple up to 0.04 on Perl Default Session ID Generator rand generation of predictable numbers or identifiers
1 week 2 days ago
A vulnerability was found in KAZEBURO Plack::Middleware::Session::Simple up to 0.04 on Perl and classified as problematic. This affects the function rand of the component Default Session ID Generator. Such manipulation leads to generation of predictable numbers or identifiers.
This vulnerability is traded as CVE-2025-40926. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2026-29039 | dgtlmoon changedetection.io up to 0.54.3 XPath Expression unparsed-text include_filters code injection (GHSA-6fmw-82m7-jq6p)
1 week 2 days ago
A vulnerability has been found in dgtlmoon changedetection.io up to 0.54.3 and classified as critical. Affected by this vulnerability is the function unparsed-text of the component XPath Expression Handler. The manipulation of the argument include_filters leads to code injection.
This vulnerability is referenced as CVE-2026-29039. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-29042 | Nuclio up to 1.15.19 special elements into a different plane (special element injection) (GHSA-95fj-3w7g-4r27)
1 week 2 days ago
A vulnerability was found in Nuclio up to 1.15.19. It has been rated as critical. This issue affects some unknown processing. Performing a manipulation results in failure to sanitize special elements into a different plane (special element injection).
This vulnerability is cataloged as CVE-2026-29042. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-28804 | py-pdf pypdf up to 6.7.4 ASCIIHexDecode algorithmic complexity (GHSA-9m86-7pmv-2852 / Nessus ID 301404)
1 week 2 days ago
A vulnerability marked as problematic has been reported in py-pdf pypdf up to 6.7.4. Impacted is an unknown function. The manipulation of the argument ASCIIHexDecode leads to inefficient algorithmic complexity.
This vulnerability is traded as CVE-2026-28804. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
vuldb.com