Aggregator
CVE-2025-31715 | Unisoc UWS6152 Vowifi Service command injection (EUVD-2025-25107)
CVE-2025-31713 | Unisoc UWS6152 Engineer Mode Service command injection
CVE-2025-7342 | Kubernetes Image Builder up to 0.1.44 hard-coded credentials (ID 133115)
Привет, GPT-5, а ты с нами поболтаешь? Учёные придумали новый тест, чтобы проверить эмоциональный интеллект нейросетей
AI slop attacks on the curl project
CVE-2022-47940 | Linux Kernel up to 5.18.17 ksmbd fs/ksmbd/smb2pdu.c smb2_write information disclosure (Nessus ID 249854)
CVE-2022-48425 | Linux Kernel up to 6.2.7 Metadata fs/ntfs3/inode.c ntfs_read_mft MFT_REC_MFT use after free (Nessus ID 249857)
CVE-2024-43822 | Linux Kernel up to 6.10.2 PCM6240 devm_kzalloc null pointer dereference (fa6f16eff732/3722873d49a1 / Nessus ID 249855)
CVE-2024-35806 | Linux Kernel up to 6.8.2 qbman cgr_lock deadlock (Nessus ID 249859 / WID-SEC-2024-1188)
Critical PostgreSQL Flaws Allow Code Injection During Restoration
The PostgreSQL Global Development Group released emergency security updates on August 14, 2025, addressing three critical vulnerabilities that enable code injection attacks during database restoration processes. The flaws affect all supported versions from PostgreSQL 13 through 17, requiring immediate patching across enterprise environments. Dangerous Dump and Restore Vulnerabilities Two severe code execution vulnerabilities, CVE-2025-8714 and […]
The post Critical PostgreSQL Flaws Allow Code Injection During Restoration appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Buttercup: Open-source AI-driven system detects and patches vulnerabilities
Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place in DARPA’s AI Cyber Challenge (AIxCC). Main components Buttercup is made up of four main components, each playing a different role in finding and fixing vulnerabilities. The orchestration/UI component keeps everything running smoothly, coordinating the actions of the other parts of the system and showing you the vulnerabilities it discovers … More →
The post Buttercup: Open-source AI-driven system detects and patches vulnerabilities appeared first on Help Net Security.
Grml 2025.08: что изменилось в популярной live-системе для профессионалов.
Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution
A critical vulnerability in Rockwell Automation’s ControlLogix Ethernet modules has been discovered that could allow remote attackers to execute malicious code on industrial control systems. The vulnerability, identified as CVE-2025-7353, affects multiple ControlLogix communication modules and carries a severe CVSS score of 9.8 out of 10, indicating the highest level of risk to affected systems. […]
The post Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Review: Data Engineering for Cybersecurity
Data Engineering for Cybersecurity sets out to bridge a gap many security teams encounter: knowing what to do with the flood of logs, events, and telemetry they collect. About the author James Bonifield has a decade of experience analyzing malicious activity, implementing data pipelines, and training others in the security industry. He has built enterprise-scale log solutions, automated detection workflows, and led analyst teams investigating major cyber threat actors. Inside the book The book is … More →
The post Review: Data Engineering for Cybersecurity appeared first on Help Net Security.
AO3 中文同人作品突破百万篇
JVN: トレンドマイクロ製企業向けエンドポイントセキュリティ製品における複数のOSコマンドインジェクションの脆弱性
Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites
As families across the country prepare for the return to school, cybercriminals are exploiting the seasonal rush with a fresh wave of sophisticated shopping scams. Leveraging peaks in online spending, scammers are deploying malicious campaigns that prey on unsuspecting users searching for supply deals and exclusive offers. The emergence of these scams coincides with growing […]
The post Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites appeared first on Cyber Security News.
Rubberduck — утка-двойник, которая превращает ваш сервер в поле боевых тестов
Weak alerting and slipping prevention raise risk levels for CISOs
Prevention effectiveness is falling, detection gaps remain wide, and attackers are exploiting weaknesses in data protection and credentials. Data theft prevention has dropped to 3 percent, password cracking success rates have nearly doubled, and new threat groups are bypassing defenses. The latest Blue Report from Picus Security shows that prevention effectiveness against cyberattacks has dropped for the first time in two years, falling from 69% in 2024 to 62% in 2025. Detection capabilities remain weak, … More →
The post Weak alerting and slipping prevention raise risk levels for CISOs appeared first on Help Net Security.