Aggregator
Submit #792283: MacCMS MacCMS Pro 2022.1.3 Upload any file [Accepted]
Open-source privacy proxy masks PII before prompts reach external AI services
Enterprise developers routinely send prompts to external large language models that contain customer emails, support transcripts, and other identifying information, often without a sanitization layer between the application and the API. Dataiku has released Kiji Privacy Proxy, an open-source local gateway that detects and masks personally identifiable information before requests leave the network. The tool sits between local applications and external AI APIs such as OpenAI and Anthropic. Inbound requests pass through a machine learning … More →
The post Open-source privacy proxy masks PII before prompts reach external AI services appeared first on Help Net Security.
Socket Buys Secure Annex to Expand Supply-Chain Visibility
Socket’s acquisition of Secure Annex extends software supply-chain security beyond open-source dependencies into browser and IDE extensions, addressing AI-driven development risks and fragmented visibility across modern developer workflows.
DHS Shutdown Ends as CISA Faces Long Recovery
The House passed a bipartisan bill funding the Department of Homeland Security, ending a 75-day shutdown that forced the Cybersecurity and Infrastructure Security Agency into a reactive posture and disrupted preventive cyber operations, even as workforce losses and proposed cuts threaten long-term resilience.
State CISOs Are Losing Confidence as AI Threats Surge
State CISO confidence has collapsed, with just 22% saying their data is protected from cyberthreats. The 2026 NASCIO-Deloitte study points to AI-enabled attacks, third-party vendor risk and the worst budget picture in years as states rethink how they defend public data.
Breach Roundup: US Cyber Command Flags Election Threats
This week, election threats resurfaced. A prolific hacker arrested. Black Axe network disrupted. China-linked disinformation targets Tibet. Exploited ScreenConnect and Windows flaws raise alarms. Minecraft gamers hit with stealer malware. A critical AI framework bug enables remote code execution.
从 Claude Code 源码泄露看 Agent 工程化防线
CVE-2026-33696:n8n原型链污染导致远程命令执行漏洞分析
Copy Fail(CVE-2026-31431):732字节脚本提权linux
Раскаленный до 500 °C лед бьет током: физики синтезировали невозможную материю из ядер далеких планет
一个基础cgi架构的路由器类型的题目复现
今日(2026年5月1日)热点网络安全漏洞动态
今日(2026年5月1日)热点网络安全漏洞动态
Shadow AI risks deepen as 31% of users get no employer training
Between one-fifth and one-third of workers use AI outside the influence and governance of the IT function, according to a global survey of 6,000 full-time employees at enterprise organizations. Researchers found a widening gap between employee AI adoption and the controls organizations have in place to manage it. The Lenovo Work Reborn Research Series 2026 report documents a workforce split into two groups: employees equipped with IT-managed tools, training, and oversight, and those operating independently … More →
The post Shadow AI risks deepen as 31% of users get no employer training appeared first on Help Net Security.
在野利用CVE-2026-34621漏洞PDF样本深度分析
AI 安全攻防实战:从对抗攻击到隐私泄露
记录如何通过内存镜像提取微信密钥并解密数据库
2026数字中国pwn
Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets
Wireshark, the world’s most widely used open-source network protocol analyzer, has released a major security update addressing over 40 vulnerabilities, several of which enable arbitrary code execution through malformed packet injection or malicious capture files. Organizations and individuals relying on Wireshark for network monitoring, forensics, and traffic analysis should update immediately to Wireshark 4.6.5. Critical […]
The post Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets appeared first on Cyber Security News.