Aggregator
CVE-2025-46580 | ZTE GoldenDB up to 6.1.03.10 resource consumption
CVE-2025-46673 | NASA CryptoLib up to 1.3.1 Space Data Link Security Protocol dynamically-managed code resources
CVE-2025-46655 | HackMD CodiMD up to 2.5.4 Content-Security-Policy Header improper protection of alternate path (Issue 1910)
CVE-2025-46654 | HackMD CodiMD up to 2.2.0 improper protection of alternate path (Issue 1910)
CVE-2025-46579 | ZTE GoldenDB up to 6.1.03.10/7.2.01.01 DDE code injection
CVE-2025-46578 | ZTE GoldenDB up to 6.1.03.10/7.2.01.01 sql injection
CVE-2025-46576 | ZTE GoldenDB up to 6.1.03.10 privileges management
CVE-2025-46656 | python-markdownify up to 0.14.0 Headline Prefix improper validation of specified quantity in input (ID 143)
CVE-2025-46653 | Formidable up to 3.5.2 weak prng
CVE-2025-46652 | IZArc up to 4.5 Archive File inclusion of web functionality from an untrusted source (GHSA-637g-8v47-79mv)
RSAC 2025创新沙盒 | CalypsoAI:锻造AI系统安全防护体系的实战路径与信任基石
银行业冲刺生成式 AI:“云、数、安”三大基建成投资主力
CVE-2024-53636 | Serosoft Academia Student Information System 1.0.118 writefile.php filePath path traversal
CVE-2025-46674 | NASA CryptoLib up to 1.3.1 Extended Procedures debug code
Week in review: MITRE ATT&CK v17.0 released, PoC for Erlang/OTP SSH bug is public
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures (TTPs) used to target VMware ESXi hypervisors. PoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433) There are now several public proof-of-concept (PoC) exploits for … More →
The post Week in review: MITRE ATT&CK v17.0 released, PoC for Erlang/OTP SSH bug is public appeared first on Help Net Security.
Building Trust Through Transparency – CISO Cybersecurity Practices
In an era of digital transformation and rising cyber threats, Building Trust Through Transparency has become a critical mission for the Chief Information Security Officer (CISO), who has evolved from a technical expert to a strategic leader responsible for protecting organizational trust. Transparency in cybersecurity practices is no longer optional but critical to effective leadership. […]
The post Building Trust Through Transparency – CISO Cybersecurity Practices appeared first on Cyber Security News.
Когда дешевле — значит мощнее: Китай снова переворачивает всё, что мы знали об искусственном интеллекте
Куки и слежка: сладость или скрытая западня?
GDPR Data Breach Notification Template With Examples [Download]
The GDPR is a law developed by the European Union (EU) to protect individuals’ personal data. Although it originated in the EU, several countries and organisations outside Europe have to date also adopted this regulation, which shows how detailed and well-thought-out it is. Among many of the GDPR’s guidelines, the data breach notification letter is […]
The post GDPR Data Breach Notification Template With Examples [Download] appeared first on Security Boulevard.