Aggregator
特朗普政府考虑对留学生进行社交媒体审查
CVE-2025-27528 | Apache InLong up to 2.1.0 Invisible Character information disclosure
CVE-2025-27526 | Apache InLong up to 2.1.0 JDBC deserialization
CVE-2025-27522 | Apache InLong up to 2.1.0 JDBC deserialization
CVE-2025-4963 | WP Extended Plugin up to 3.0.15 on WordPress SVG File Parser cross site scripting
94 миллиарда украденных файлов cookie опубликованы в дарквебе
逾 2% 美国人服用 GLP-1 减肥药
栈溢出从复现到挖掘-CVE-2018-18708漏洞复现详解
Why data provenance must anchor every CISO’s AI governance strategy
Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording sensitive employee communications. Compliance teams are experimenting with due diligence automation. Most of these functions are built on large language models (LLMs), and they’re often introduced under the radar, wrapped in SaaS platforms, productivity tools, or internal pilots. It’s not the adoption that worries me. … More →
The post Why data provenance must anchor every CISO’s AI governance strategy appeared first on Help Net Security.
CVE-2025-40911 | RRWO Net::CIDR::Set 0.10/0.11/0.12/0.13 on Perl IP CIDR Address String improper validation of specified type of input
CVE-2025-2796 | Arista EOS up to 4.33.2F Hardware IPSec Support authentication replay
CVE-2024-11185 | Arista EOS up to 4.29.10M/4.30.9M/4.31.6M/4.32.3M/4.33.1F VLAN access control
CVE-2025-25029 | IBM Security Guardium 12.0 escape output
CVE-2025-25026 | IBM Security Guardium 12.0 authorization
CVE-2025-2826 | Arista EOS 4.33.2F ACL Policy improper validation of specified quantity in input
CVE-2025-25025 | IBM Security Guardium 12.0 information exposure
CVE-2024-45094 | IBM Hardware Management Console DS8A00/DS8900F HCM cross site scripting
CVE-2025-32440 | jokob-sk NetAlertX up to 25.4.13 util.php missing authentication (GHSA-h4x5-vr54-vjrx)
Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
Woodpecker is an open-source tool that automates red teaming, making advanced security testing easier and more accessible. It helps teams find and fix security weaknesses in AI systems, Kubernetes environments, and APIs before attackers can exploit them. Key features of Woodpecker “We noticed recently that a number of companies are now selling red-teaming features as commercial products, so we wanted to democratize access to core red teaming capabilities that we don’t think should be limited … More →
The post Woodpecker: Open-source red teaming for AI, Kubernetes, APIs appeared first on Help Net Security.