Aggregator
CVE-2026-27416 | bPlugins PDF Poster Plugin up to 2.4.1 on WordPress authorization (EUVD-2026-28336)
CVE-2023-0417 | Wireshark up to 3.6.10/4.0.2 NFS Dissector denial of service (Issue 18628 / EUVD-2023-12474)
CVE-2023-0412 | Wireshark up to 3.6.10/4.0.2 TIPC Dissector denial of service (Issue 18770 / EUVD-2023-12469)
CVE-2024-43384 | Phoenix Contact FL MGUARD 2102 up to 10.4.0 improper removal of sensitive information before storage or transfer (VDE-2024-039)
Киберстрахование в России: почему бизнес до сих пор не покупает полисы. Кибердом запустил опрос, чтобы найти настоящие причины
Daemon Tools Developer Confirms Software Was Trojanized
今日(2026年5月7日)热点网络安全漏洞动态
Node.js 26 ships with Temporal API enabled by default
Developers managing JavaScript runtimes have a new major version to evaluate. Node.js 26.0.0 brings the long-awaited Temporal API to the platform alongside an updated V8 engine, a refreshed HTTP client, and several long-flagged removals that will require code changes in some applications. Temporal API ready for production code Temporal, a date and time API designed to replace the aging Date object, is now available in Node.js without an experimental flag. The API offers richer handling … More →
The post Node.js 26 ships with Temporal API enabled by default appeared first on Help Net Security.
消除「AI 学习门槛」,这个 Agent 想让普通人「无脑上手」
550 亿美元!马斯克的「芯片工厂」开始成为现实
Zero-Day Surge: The MetInfo CMS Flaw That Grants Unauthenticated Root Access to Servers
A zero-day vulnerability residing within the Chinese content management system MetInfo has entered a phase of active exploitation
The post Zero-Day Surge: The MetInfo CMS Flaw That Grants Unauthenticated Root Access to Servers appeared first on Penetration Testing Tools.
Facial recognition arrives at the gates of Disney’s magic kingdom
Disney has equipped select entrance lanes at Disneyland Park and Disney California Adventure Park with facial recognition technology, saying the system is intended to streamline re-entry procedures and help prevent fraud. According to the company, certain entrance lanes use cameras to capture an image linked to a guest’s ticket or pass and compare it with a newly taken image at the entrance. The system then converts both images into unique numerical values using biometric technology … More →
The post Facial recognition arrives at the gates of Disney’s magic kingdom appeared first on Help Net Security.
PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux
Dragon Breath’s Leaked Driver Shatters Windows Security and Neutralizes EDRs
The Chinese cyber-espionage collective Dragon Breath, also recognized by the designation APT-Q-27, has purportedly acquired a formidable new
The post Dragon Breath’s Leaked Driver Shatters Windows Security and Neutralizes EDRs appeared first on Penetration Testing Tools.
一文读懂:后量子密码硬件的安全 “补丁”——PF-PINI 论文核心解读
BO Team’s Pivot to High-Stakes Industrial Espionage and the ZeroSSH Threat
Over the past year, BO Team has significantly recalibrated its approach to incursions against Russian organizations. The syndicate
The post BO Team’s Pivot to High-Stakes Industrial Espionage and the ZeroSSH Threat appeared first on Penetration Testing Tools.
Защита от DDoS и крыша для атакующих. Парадокс Cloudflare, который раскрылся после атаки на Ubuntu
漏洞通告 | Apache HTTP Server 远程命令执行漏洞
CallPhantom Android scam reached 7.3 million downloads on Google Play
Scams targeting Android users in India and across the Asia-Pacific region have grown around a long-standing curiosity gap: the desire to look up call records tied to a phone number. A cluster of 28 fraudulent apps on Google Play exploited that gap and pulled in more than 7.3 million downloads before the store removed them. ESET researchers, who tracked the campaign and named it CallPhantom, reported the apps to Google on December 16, 2025, and … More →
The post CallPhantom Android scam reached 7.3 million downloads on Google Play appeared first on Help Net Security.