Aggregator
CVE-2025-61736 | Johnson Controls iSTAR eX improper validation of certificate expiration (icsa-25-338-04)
被炒鱿鱼后怒删96个政府数据库!两兄弟向AI求助清除痕迹,结果栽了……
CVE-2025-32901 | KDE Connect up to 1.32.x on Android Broadcast UDP improper validation of specified type of input
Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities
Check Point announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments, and simplify zero trust across hybrid networks. “As organizations embrace AI, security teams are under growing pressure to protect more data, more applications and more distributed environments,” said Nataly Kremer, Chief Product Officer at Check Point Software Technologies. “R82.10 helps enterprises shift to a prevention-first model by unifying management, strengthening … More →
The post Check Point introduces Quantum Firewall R82.10 with new AI and zero trust security capabilities appeared first on Help Net Security.
CVE-2016-20023 | CKSource CKFinder prior 2.5.0.1 on ASP.NET path traversal
CVE-2025-32899 | KDE Connect up to 1.32.x on Android Packet improper preservation of consistency between independent representations of shared state
CVE-2025-66270 | KDE Connect Protocol 8 authentication spoofing
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
CVE-2025-32900 | KDE Connect information-exchange Protocol prior 2025-04-18 less trusted source
Три часа тишины. Android начнет задерживать СМС с кодами, чтобы защитить вас
CVE-2025-27389 | ColorOS up to 15 Installation authentication spoofing
CVE-2025-32898 | KDE Connect verification-code Protocol entropy
从“被动合规”到“主动运营”:漏洞风险例外管理机制实践
为什么安全意识培训“没用”?研究揭示问题根源与改进方向
Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer
A dangerous new wave of phishing attacks is targeting Solana users by changing wallet ownership permissions rather than stealing private keys. A victim lost more than USD 3 million in a single attack, with an additional USD 2 million locked in investment platforms. What makes this attack unique is that the user’s funds remained visible […]
The post Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer appeared first on Cyber Security News.
自组装轻型飞机因 3D 打印零部件受热软化而坠机
斯巴鲁车主抱怨驾车过程中弹出全屏广告
Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely
A critical command injection vulnerability in the open-source network monitoring tool Cacti allows authenticated attackers to execute arbitrary code remotely, potentially compromising the entire monitoring infrastructure. The flaw, tracked as CVE-2025-66399, affects all versions up to 1.2.28 and stems from inadequate input validation in the SNMP device configuration functionality. The vulnerability resides in the device […]
The post Cacti Command Injection Vulnerability Let Attackers Execute Malicious Code Remotely appeared first on Cyber Security News.