Aggregator
Админ забыл обновить VBR. Теперь компании из Fortune 500 остались без данных
Timelines for migration to post-quantum cryptography
Dashlane’s AI model alerts businesses to phishing risks
Dashlane introduced AI phishing alerts, an advancement to the Dashlane Omnix platform that protects enterprises and users against threats targeting user credentials. Trained by Dashlane on both legitimate and phishing sources, the new innovation detects and alerts users to phishing risks the moment they visit a suspicious website, while giving admins the insights to secure employees against phishing domains. AI has made it even easier for threat actors to continually evolve their tactics to evade … More →
The post Dashlane’s AI model alerts businesses to phishing risks appeared first on Help Net Security.
关于BlackMoon变种HTTPBot僵尸网络的风险提示
Kusari Inspector improves supply chain security
Kusari unveiled Kusari Inspector, an AI-based pull request security tool that brings cutting-edge security risk analysis directly into developers’ daily workflows. In Kusari Inspector, Kusari has brought together a powerful combination of industry standards, AI, and dependency graph analysis, to help organizations detect software supply chain risks early during the pull request process, and address them before code integration. The tool finds security weaknesses and supply chain risks in order to maintain secure development throughout … More →
The post Kusari Inspector improves supply chain security appeared first on Help Net Security.
CVE-2025-49149 | langgenius dify 1.2.0 cross site scripting (GHSA-grmh-ww4v-5cgj)
CVE-2025-41413 | Fuji Electric Smart Editor up to 1.0.1.0 out-of-bounds write (icsa-25-168-04)
CVE-2025-41388 | Fuji Electric Smart Editor up to 1.0.1.0 stack-based overflow (icsa-25-168-04)
CVE-2025-32412 | Fuji Electric Smart Editor up to 1.0.1.0 out-of-bounds (icsa-25-168-04)
腾讯iOA EDR:全方位狙击银狐木马,破解“钓鱼+免杀”组合拳
CVE-2025-49384 | Trend Micro Internet Security 8/10/11.0/12.00 Build 1244/17.0.1224 shortcut
CVE-2025-5141 | Fortra Core Privileged Access Manager up to 7.2.0.17/8.1.0.22/8.1.1.7/9.0.0.1 on Linux BoKS Server Agent cache containing sensitive information
CVE-2025-49593 | portainer Community Edition up to 2.27.6/2.30.x information disclosure (GHSA-h5jw-8c32-xfv6)
CVE-2024-40570 | SeaCMS 12.9 admin_datarelate.php sql injection (Issue 20)
CVE-2025-51381 | KAON KCM3100 up to 1.4.2 authentication bypass
CVE-2025-23252 | NVIDIA NVDebug Tool 1.6.0 internal asset exposed to unsafe debug access level or state
CVE-2025-49843 | conda-forge conda-smithy up to 3.47.0 Configuration File travis_headers default permission (GHSA-h9v8-rrqg-3m95)
CVE-2025-49847 | ggml-org llama.cpp llama.cpp/src/vocab.cpp token_to_piece memory corruption (GHSA-8wwf-w4qm-gpqr)
Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF, when utilized by the graduated CNCF Cilium and its sub-project Tetragon, combined with Software Bills of Materials (SBOMs), can provide insights and a security feedback loop for modern systems. We’ll create a container image and its SBOM. We’ll then launch it, simulate a breach, and see how our eBPF-based setup with Tetragon captures the issue. … More →
The post Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security appeared first on Help Net Security.