Aggregator
CVE-2025-33217 | NVIDIA GeForce/RTX PRO/RTX/Quadro/Tesla on Windows use after free (WID-SEC-2026-0235)
CVE-2025-33220 | NVIDIA GeForce Virtual GPU Manager use after free (WID-SEC-2026-0235)
CVE-2024-29926 | HasThemes WC Builder Plugin up to 1.0.18 on WordPress cross site scripting
CVE-2024-37502 | wpweb WooCommerce Social Login Plugin up to 2.6.3 on WordPress deserialization
CVE-2024-39651 | WPWeb WooCommerce PDF Vouchers Plugin up to 4.9.4 on WordPress path traversal
CVE-2024-43131 | WPWeb Docket Plugin up to 1.6.x on WordPress authorization
CVE-2024-29142 | WebberZone Better Search Plugin up to 3.3.0 on WordPress Search Result cross site scripting
CVE-2024-29102 | HasThemes Extensions for CF7 Plugin up to 3.0.6 on WordPress cross site scripting
CVE-2024-29094 | HasThemes HT Easy GA4 Plugin up to 1.1.7 on WordPress cross site scripting
CVE-2024-29927 | HasTheme WishSuite Plugin up to 1.3.7 on WordPress cross site scripting
CVE-2024-39652 | WPWeb Elite WooCommerce PDF Vouchers Plugin up to 4.9.4 on WordPress cross site scripting
CVE-2024-47369 | WPWeb Social Auto Poster Plugin up to 5.3.15 on WordPress cross site scripting
NDSS 2025 – Recurrent Private Set Intersection For Unbalanced Databases With Cuckoo Hashing
Session 10C: Privacy Preservation
Authors, Creators & Presenters: Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi)
PAPER
Recurrent Private Set Intersection for Unbalanced Databases with Cuckoo Hashing and Leveled FHE
A Private Set Intersection (PSI) protocol is a cryptographic method allowing two parties, each with a private set, to determine the intersection of their sets without revealing any information about their entries except for the intersection itself. While extensive research has focused on PSI protocols, most studies have centered on scenarios where two parties possess sets of similar sizes, assuming a semi-honest threat model. However, when the sizes of the parties' sets differ significantly, a generalized solution tends to underperform compared to a specialized one, as recent research has demonstrated. Additionally, conventional PSI protocols are typically designed for a single execution, requiring the entire protocol to be re-executed for each set intersection. This approach is suboptimal for applications such as URL denylisting and email filtering, which may involve multiple set intersections of small sets against a large set (e.g., one for each email received). In this study, we propose a novel PSI protocol optimized for the recurrent setting where parties have unbalanced set sizes. We implement our protocol using Levelled Fully Homomorphic Encryption and Cuckoo hashing, and introduce several optimizations to ensure real-time performance. By utilizing the Microsoft SEAL library, we demonstrate that our protocol can perform private set intersections in 20 ms and 240 ms on 10 Gbps and 100 Mbps networks, respectively. Compared to existing solutions, our protocol offers significant improvements, reducing set intersection times by one order of magnitude on slower networks and by two orders of magnitude on faster networks.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Recurrent Private Set Intersection For Unbalanced Databases With Cuckoo Hashing appeared first on Security Boulevard.
Survey Surfaces Lots of Room for DevSecOps Improvement
A survey of 506 cybersecurity leaders and practitioners working for organizations with more than 500 employees, published today, finds that while 80% report security and DevOps teams are using shared observability tools, less than half (45%) say the two teams are very aligned on tooling and workflows compared to 43% that said these teams are..
The post Survey Surfaces Lots of Room for DevSecOps Improvement appeared first on Security Boulevard.
U.S. CISA adds a flaw in multiple Fortinet products to its Known Exploited Vulnerabilities catalog
SSO vs. Federated Identity Management: A Guide
5 min readManaging digital identities for both human and non-human users is a central challenge for modern organizations. As companies adopt more SaaS platforms, microservices, and multi-cloud environments, they face two major identity challenges: Each login represents a potential vulnerability and productivity loss. According to 1Password, one in three employees (34%) reuse passwords at work, even when […]
The post SSO vs. Federated Identity Management: A Guide appeared first on Aembit.
The post SSO vs. Federated Identity Management: A Guide appeared first on Security Boulevard.