Aggregator
逾 2% 美国人服用 GLP-1 减肥药
栈溢出从复现到挖掘-CVE-2018-18708漏洞复现详解
Why data provenance must anchor every CISO’s AI governance strategy
Across the enterprise, artificial intelligence has crept into core functions – not through massive digital transformation programs, but through quiet, incremental adoption. Legal departments are summarizing contracts. HR is rewording sensitive employee communications. Compliance teams are experimenting with due diligence automation. Most of these functions are built on large language models (LLMs), and they’re often introduced under the radar, wrapped in SaaS platforms, productivity tools, or internal pilots. It’s not the adoption that worries me. … More →
The post Why data provenance must anchor every CISO’s AI governance strategy appeared first on Help Net Security.
CVE-2025-40911 | RRWO Net::CIDR::Set 0.10/0.11/0.12/0.13 on Perl IP CIDR Address String improper validation of specified type of input
CVE-2025-2796 | Arista EOS up to 4.33.2F Hardware IPSec Support authentication replay
CVE-2024-11185 | Arista EOS up to 4.29.10M/4.30.9M/4.31.6M/4.32.3M/4.33.1F VLAN access control
CVE-2025-25029 | IBM Security Guardium 12.0 escape output
CVE-2025-25026 | IBM Security Guardium 12.0 authorization
CVE-2025-2826 | Arista EOS 4.33.2F ACL Policy improper validation of specified quantity in input
CVE-2025-25025 | IBM Security Guardium 12.0 information exposure
CVE-2024-45094 | IBM Hardware Management Console DS8A00/DS8900F HCM cross site scripting
CVE-2025-32440 | jokob-sk NetAlertX up to 25.4.13 util.php missing authentication (GHSA-h4x5-vr54-vjrx)
Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
Woodpecker is an open-source tool that automates red teaming, making advanced security testing easier and more accessible. It helps teams find and fix security weaknesses in AI systems, Kubernetes environments, and APIs before attackers can exploit them. Key features of Woodpecker “We noticed recently that a number of companies are now selling red-teaming features as commercial products, so we wanted to democratize access to core red teaming capabilities that we don’t think should be limited … More →
The post Woodpecker: Open-source red teaming for AI, Kubernetes, APIs appeared first on Help Net Security.
The Seven Pillars of a Secure AI Strategy
As CISOs grow confident with standard cybersecurity tools, AI security remains a grey area. By systematically breaking down AI security into seven key pillars - rather than waiting for a comprehensive solution - organizations can embed security by design to proactively address emerging cyberthreats.
Salt Typhoon Believed to Be Behind Commvault Data Breach
A suspected Chinese state hacking group linked to last year’s telecom intrusions breached Commvault’s Microsoft Azure environment, exposing sensitive Microsoft 365 credentials and reigniting fears over U.S. cloud infrastructure vulnerabilities and default security settings.
Check Point Buys Startup Veriti to Advance Threat Management
Check Point will fold Israeli firm Veriti into its Quantum suite following an acquisition aimed at streamlining automated security response across endpoints, firewalls and cloud environments. Veriti’s patented technology is seen as critical to reducing misconfigurations without business disruption.
RobbinHood Ransomware Hacker Pleads Guilty in US Court
An Iranian national behind a spate of ransomware attacks against U.S. municipalities including an attack that cost the city of Baltimore $19 million to rectify pleaded guilty in U.S. federal court Tuesday afternoon. Sina Gholinejad, 37, admitted to deploying Robinhood ransomware.
Patched GitLab Duo Flaws Risked Code Leak, Malicious Content
Hackers can exploit vulnerabilities in a generative artificial intelligence assistant integrated across GitLab's DevSecOps platform to manipulate the model's output, exfiltrate source code and potentially deliver malicious content through the platform's user interface.