Aggregator
ИИ уже думает за нас. Скоро — строит себя сам. Человечество — уже просто баг в его логике
IoT and Cloud Systems Face Escalating Cyber Risks Amid Global Instability
As geopolitical tensions rise, companies face an expanding threat landscape - particularly through IoT and OT vulnerabilities that leave cloud infrastructures at risk, said PJ Hamlen at Amazon Web Services, and Julie Bernard at Deloitte & Touche LLP.
Sale of 23andMe: On the Hot Seat of Congress, States
While a Congressional committee grilled 23andMe executives on Tuesday about security and privacy, 28 states filed a lawsuit to stop the sale of the bankrupt genetics testing firm unless the company obtains explicit consent from each customer for the transfer or their information to a third party.
300K Crash Reports Stolen in Texas DOT Hack
Hackers accessed the Texas Department of Transportation's crash records system using a compromised account, stealing nearly 300,000 reports containing personal and vehicle information that could be used for fraud, the department warned in a letter to impacted individuals.
How to Get a Clearer Picture of Vendor Risk
As vendor ecosystems grow in complexity, many organizations still view third-party risk management as a static assessment of vendors as they're onboarded. But organizations often focus too heavily on upfront vetting of vendors and fail to track how their risk profiles may change over time.
CVE-2025-3302 | Xagio SEO Plugin up to 7.1.0.16 on WordPress HTTP_REFERER cross site scripting (EUVD-2025-18096)
CVE-2025-5144 | Events Calendar Plugin up to 6.13.2 on WordPress cross site scripting
CVE-2025-4315 | CubeWP Plugin up to 1.1.23 on WordPress update_user_meta privilege escalation (EUVD-2025-18093)
Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable
A critical vulnerability (CVE-2025-4275) in Insyde H2O UEFI firmware allows attackers to bypass Secure Boot protections by injecting malicious digital certificates via an unprotected NVRAM variable. Dubbed Hydroph0bia, this flaw enables pre-boot execution of unsigned code, posing severe risks to enterprise and consumer devices. Insecure NVRAM Variable Handling The vulnerability stems from the improper use […]
The post Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft залатала 66 дыр, но одна из них уже впустила хакеров — угадайте, какая
Telegram、中间人以及 FSB
ИИ без облака, без шума и без слежки. Теперь только у Apple — и это пугающе честно
CVE-2024-26170
SELECTFUZZ:采用选择性路径探索的高效定向模糊测试
Multiple Chrome Flaws Enable Remote Code Execution by Attackers
Google Chrome’s Stable channel is being updated to version 137.0.7151.103 for Windows and Mac, with Linux receiving version 137.0.7151.103 as well. The rollout will take place gradually over the coming days and weeks, ensuring smooth deployment and minimal disruption for users. The official changelog provides a detailed breakdown of all modifications and enhancements included in […]
The post Multiple Chrome Flaws Enable Remote Code Execution by Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
国家网络安全通报中心:重点防范境外恶意网址和恶意IP
Dark Partners网络犯罪团伙助长了大规模加密货币抢劫案的发生
OWASP Nettacker: Open-source scanner for recon and vulnerability assessment
OWASP Nettacker is a free, open-source tool designed for network scanning, information gathering, and basic vulnerability assessment. Built and maintained by the OWASP community, Nettacker helps security pros automate common tasks like port scanning, service detection, and brute-force attacks. It offers a controlled and extensible framework for running these tests. What it does Nettacker scans networks to find weaknesses. It maps out live hosts, open ports, services, and basic misconfigurations. It can also run some … More →
The post OWASP Nettacker: Open-source scanner for recon and vulnerability assessment appeared first on Help Net Security.