Aggregator
Warrant requirements, Democratic worries could factor into spy law renewal debate
A fresh effort is mounting in Congress to require federal agents to obtain a warrant before searching a government surveillance database for information about U.S. citizens, as Congress again faces an impending deadline, in four months, to renew a major surveillance law. But there are also signs that renewal of Section 702 of the Foreign […]
The post Warrant requirements, Democratic worries could factor into spy law renewal debate appeared first on CyberScoop.
CVE-2023-53364 | Linux Kernel up to 6.4.11 regulator null pointer dereference (Nessus ID 265459)
CVE-2022-50381 | Linux Kernel up to 6.1.2 md_end_flush null pointer dereference (Nessus ID 265568 / WID-SEC-2025-2092)
CVE-2022-50382 | Linux Kernel up to 5.10.162/5.15.85/6.0.15/6.1.1 padata parallel deadlock (Nessus ID 265567 / WID-SEC-2025-2092)
CVE-2022-50383 | Linux Kernel up to 6.0.15/6.1.1 v4l2_m2m_buf_done null pointer dereference (Nessus ID 265552 / WID-SEC-2025-2092)
CVE-2025-9398 | YiFang CMS up to 2.0.5 Migrate.php exportInstallTable information disclosure (EUVD-2025-25652)
CVE-2025-9399 | YiFang CMS up to 2.0.5 app/logic/L_tool.php new_url sql injection
CVE-2025-9400 | YiFang CMS up to 2.0.5 P_file.php mergeMultipartUpload File unrestricted upload (EUVD-2025-25653)
CVE-2024-3817 | HashiCorp Shared library up to 1.7.2 argument injection (Nessus ID 215185)
CVE-2024-6257 | HashiCorp Shared Library up to 1.7.3 go-getter command injection (Nessus ID 211431)
CVE-2025-66516
GeminiJack zero-click flaw in Gemini Enterprise allowed corporate data exfiltration
From Chatbot to Code Threat: OWASP’s Agentic AI Top 10 and the Specialized Risks of Coding Agents
The post From Chatbot to Code Threat: OWASP’s Agentic AI Top 10 and the Specialized Risks of Coding Agents appeared first on Security Boulevard.
Attackers Exploited Gogs Zero-Day Flaw for Months
User Scanner: Scan a username across multiple social, developer, gaming and creator platforms to see if it’s available
NDSS 2025 – URVFL: Undetectable Data Reconstruction Attack On Vertical Federated Learning
Session 5C: Federated Learning 1
Authors, Creators & Presenters: Duanyi Yao (Hong Kong University of Science and Technology), Songze Li (Southeast University), Xueluan Gong (Wuhan University), Sizai Hou (Hong Kong University of Science and Technology), Gaoning Pan (Hangzhou Dianzi University)
PAPER
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning
Vertical Federated Learning (VFL) is a collaborative learning paradigm designed for scenarios where multiple clients share disjoint features of the same set of data samples. Albeit a wide range of applications, VFL is faced with privacy leakage from data reconstruction attacks. These attacks generally fall into two categories: honest-but-curious (HBC), where adversaries steal data while adhering to the protocol; and malicious attacks, where adversaries breach the training protocol for significant data leakage. While most research has focused on HBC scenarios, the exploration of malicious attacks remains limited. Launching effective malicious attacks in VFL presents unique challenges: 1) Firstly, given the distributed nature of clients' data features and models, each client rigorously guards its privacy and prohibits direct querying, complicating any attempts to steal data; 2) Existing malicious attacks alter the underlying VFL training task, and are hence easily detected by comparing the received gradients with the ones received in honest training. To overcome these challenges, we develop URVFL, a novel attack strategy that evades current detection mechanisms. The key idea is to integrate a discriminator with auxiliary classifier that takes a full advantage of the label information and generates malicious gradients to the victim clients: on one hand, label information helps to better characterize embeddings of samples from distinct classes, yielding an improved reconstruction performance; on the other hand, computing malicious gradients with label information better mimics the honest training, making the malicious gradients indistinguishable from the honest ones, and the attack much more stealthy. Our comprehensive experiments demonstrate that URVFL significantly outperforms existing attacks, and successfully circumvents SOTA detection methods for malicious attacks. Additional ablation studies and evaluations on defenses further underscore the robustness and effectiveness of URVFL
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – URVFL: Undetectable Data Reconstruction Attack On Vertical Federated Learning appeared first on Security Boulevard.