Aggregator
CVE-2024-1708
CVE-2024-30085
CVE-2025-55182
CVE-2025-20362
CVE-2025-20333
CVE-2025-29927
CVE-2025-4802
In-circuit NAND acquisition for edge devices (Raspberry Pi GPIO, no chip-off)
Open-source privacy proxy masks PII before prompts reach external AI services
Enterprise developers routinely send prompts to external large language models that contain customer emails, support transcripts, and other identifying information, often without a sanitization layer between the application and the API. Dataiku has released Kiji Privacy Proxy, an open-source local gateway that detects and masks personally identifiable information before requests leave the network. The tool sits between local applications and external AI APIs such as OpenAI and Anthropic. Inbound requests pass through a machine learning … More →
The post Open-source privacy proxy masks PII before prompts reach external AI services appeared first on Help Net Security.
Socket Buys Secure Annex to Expand Supply-Chain Visibility
Socket’s acquisition of Secure Annex extends software supply-chain security beyond open-source dependencies into browser and IDE extensions, addressing AI-driven development risks and fragmented visibility across modern developer workflows.
DHS Shutdown Ends as CISA Faces Long Recovery
The House passed a bipartisan bill funding the Department of Homeland Security, ending a 75-day shutdown that forced the Cybersecurity and Infrastructure Security Agency into a reactive posture and disrupted preventive cyber operations, even as workforce losses and proposed cuts threaten long-term resilience.
State CISOs Are Losing Confidence as AI Threats Surge
State CISO confidence has collapsed, with just 22% saying their data is protected from cyberthreats. The 2026 NASCIO-Deloitte study points to AI-enabled attacks, third-party vendor risk and the worst budget picture in years as states rethink how they defend public data.
Breach Roundup: US Cyber Command Flags Election Threats
This week, election threats resurfaced. A prolific hacker arrested. Black Axe network disrupted. China-linked disinformation targets Tibet. Exploited ScreenConnect and Windows flaws raise alarms. Minecraft gamers hit with stealer malware. A critical AI framework bug enables remote code execution.
从 Claude Code 源码泄露看 Agent 工程化防线
CVE-2026-33696:n8n原型链污染导致远程命令执行漏洞分析
一个基础cgi架构的路由器类型的题目复现
今日(2026年5月1日)热点网络安全漏洞动态
今日(2026年5月1日)热点网络安全漏洞动态
Shadow AI risks deepen as 31% of users get no employer training
Between one-fifth and one-third of workers use AI outside the influence and governance of the IT function, according to a global survey of 6,000 full-time employees at enterprise organizations. Researchers found a widening gap between employee AI adoption and the controls organizations have in place to manage it. The Lenovo Work Reborn Research Series 2026 report documents a workforce split into two groups: employees equipped with IT-managed tools, training, and oversight, and those operating independently … More →
The post Shadow AI risks deepen as 31% of users get no employer training appeared first on Help Net Security.