Aggregator
CVE-2025-43284 | Apple macOS up to 13.6/14.6/15.5 out-of-bounds
CVE-2025-39246 | Hikvision HikCentral FocSign unquoted search path
CVE-2025-58062 | LSTM-Kirigaya openmcp-client up to 0.1.11 open os command injection (GHSA-43m4-p3rv-c4v8)
CVE-2025-43187 | Apple macOS up to 13.6/14.6/15.5 hdiutil Local Privilege Escalation
CVE-2025-54142 | Akamai Ghost 2025-03-26 request smuggling
CVE-2025-53508 | iND HL330-DLS Product Name os command injection (dceid-2025-001)
CVE-2025-9639 | Ai3 QbiCRMGateway up to 8.5.03 path traversal
CVE-2025-53507 | iND HL330-DLS sensitive information (dceid-2025-001)
CVE-2025-8857 | Changing Clinic Image System up to 2.4.23.2131 hard-coded credentials
CVE-2025-58061 | openebs rawfile-localpv up to 0.9.x /var/csi/rawfile/ information disclosure (GHSA-wh95-vw4r-xwx4)
Ваш ИИ-помощник теперь умеет предавать. Claude научили слушаться скрытых команд с сайтов
Finding connection and resilience as a CISO
With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are critical for resilience, both organizationally and personally. In this Help Net Security interview, Michael Green, CISO at Trellix, discusses how CISOs can build trusted communities, balance information sharing with confidentiality, and avoid burnout while leading at the highest level. … More →
The post Finding connection and resilience as a CISO appeared first on Help Net Security.
Organized and Criminal, Ransomware Gangs Run Up Profits
Ransomware attacks are rising 49% as cyber gangs evolve into organized criminal enterprises. With over 200 groups operating like corporations — recruiting talent, using RaaS models, and deploying multi-extortion tactics — defenders must strengthen foundational controls, limit vendor access, and prioritize vulnerability management to stay ahead.
The post Organized and Criminal, Ransomware Gangs Run Up Profits appeared first on Security Boulevard.
Organized and Criminal, Ransomware Gangs Run Up Profits
AI isn’t taking over the world, but here’s what you should worry about
In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. He explains how large language models actually work, why they can’t become sentient, and where the real risks lie: from misinformation and data leaks to phishing and malware. Meyer also highlights practical, safe ways AI can support cybersecurity professionals.
The post AI isn’t taking over the world, but here’s what you should worry about appeared first on Help Net Security.
ZDI-CAN-27998: Autodesk
JVN: コニカミノルタ製bizhubシリーズにおけるサービス運用妨害(DoS)の脆弱性
LF Networking объявило о выходе Essedum Release 1.0 для сетевого ИИ
Blind Eagle’s Expanding Cyber Campaigns: Five Clusters Targeting Colombia’s Government and Beyond
Researchers at Recorded Future’s Insikt Group documented five distinct clusters of activity attributed to the persistent threat actor Blind Eagle (also tracked as TAG-144) between May 2024 and July 2025. The primary focus of...
The post Blind Eagle’s Expanding Cyber Campaigns: Five Clusters Targeting Colombia’s Government and Beyond appeared first on Penetration Testing Tools.