Aggregator
CVE-2026-32885 | DDEV up to 1.25.1 pkg/archive/archive.go Untar/Unzip path traversal (GHSA-x2xq-qhjf-5mvg / EUVD-2026-25049)
«Горжусь тем, что виновен!» Дурову прислали повестку на имя «подозреваемого» в российскую квартиру
[un]prompted 2026 – macOS Vulnerability Research: Augmenting Apple’s Source Code And OS Logs With AI Agents
Author, Creator & Presenter: Olivia Gallucci, Security Engineer, Datadog
Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations' YouTube Channel.
The post [un]prompted 2026 – macOS Vulnerability Research: Augmenting Apple’s Source Code And OS Logs With AI Agents appeared first on Security Boulevard.
Hackers deployed wiper malware in destructive attacks on Venezuela’s energy sector
CVE-2026-28950 | Apple iOS/iPadOS up to 18.7.7/26.4.1 Notifications log file
CVE-2026-26354 | Dell PowerProtect Data Domain up to 7.13.1.60/8.3.1.10/8.6 stack-based overflow (dsa-2026-060)
CVE-2026-41468 | Beghelli SicuroWeb 1.5.2 unmaintained third party components (EUVD-2026-25075)
CVE-2026-41469 | Beghelli SicuroWeb Content Security Policy protection mechanism (EUVD-2026-25077)
Supply Chain Attacks Are Getting Worse—How to Shrink Your Exposure
In March 2026, Trivy, one of the most widely used open-source vulnerability scanners in the Kubernetes ecosystem, was weaponized against the very organizations that relied on it for security. Attackers compromised the Aqua Security repository, force-pushed malicious binaries, and poisoned 75 of 76 version tags in the process. Any pipeline that pulled trivy:latest or one of the affected tagged binaries during the active exploitation window ran attacker-controlled code and potentially exfiltrated secrets to an external server.
The post Supply Chain Attacks Are Getting Worse—How to Shrink Your Exposure appeared first on Security Boulevard.
The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them
In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These are the business logic flaws: subtle mistakes in an application's design or workflow that malicious actors can exploit by doing the unexpected. As a result, companies can be blindsided by breaches even when their vulnerability scan reports come back clean.
The post The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them appeared first on Security Boulevard.