Aggregator
Cybersecurity research is getting new ethics rules, here’s what you need to know
Top cybersecurity conferences are introducing new rules that require researchers to formally address ethics in their work. Starting with the 2026 USENIX Security Symposium, all submissions must include a stakeholder-based ethics analysis. Other major venues such as IEEE Security and Privacy, and ACM CCS have also emphasized the importance of ethical review in recent calls for papers. This change reflects a growing concern that cybersecurity research can unintentionally cause harm. Research that exposes vulnerabilities, collects … More →
The post Cybersecurity research is getting new ethics rules, here’s what you need to know appeared first on Help Net Security.
Off Your Docker: Exposed APIs Are Targeted in New Malware Strain
Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details
Tenable has confirmed a data breach that exposed the contact details and support case information of some of its customers. The company stated the incident is part of a broader data theft campaign targeting an integration between Salesforce and the Salesloft Drift marketing application, which has affected numerous organizations. In a public statement, Tenable expressed […]
The post Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details appeared first on Cyber Security News.
9,9 из 10 и финансовый шпионаж в SAP. Корпоративная ERP-система стала мишенью для хакеров по всему миру
企业注册资金实缴操作指南
InterceptSuite: Open-source network traffic interception tool
InterceptSuite is an open-source, cross-platform network traffic interception tool designed for TLS/SSL inspection, analysis, and manipulation at the network level. “InterceptSuite is designed primarily for non-HTTP protocols, although it does support HTTP/1 and HTTP/2. It offers support for databases, SMTP, and custom protocols, and can manage unknown protocols and their TLS connections. Developed in C, it ensures efficient memory management and performance, utilising native SOCKS5 proxy support on Linux, Mac, and Windows, with OpenSSL for … More →
The post InterceptSuite: Open-source network traffic interception tool appeared first on Help Net Security.
两名作者对苹果公司发起集体诉讼 指控苹果窃取书籍并利用内容训练AI模型
GPT 使用的中文语料被成人赌博内容污染
CVE-2025-10093 | D-Link DIR-852 up to 1.00CN B09 Device Configuration /getcfg.php phpcgi_main information disclosure (EUVD-2025-27121)
CVE-2025-58422 | Ricoh Streamline NX HTTP Request less trusted source (icoh-2025-000010 / EUVD-2025-27108)
知名安卓启动器Nova Launcher的创始人离开 原本的开源计划应该也没戏了
КИИ Basic от Security Vision
Submit #644935: D-Link DIR-852 1.00CN B09 Exposure of Sensitive Information Through Data Queries [Accepted]
CVE-2025-10092 | Jinher OA up to 1.2 XML ?Type=add xml external entity reference (EUVD-2025-27123)
CVE-2025-10091 | Jinher OA up to 1.2 XML ?Type=add xml external entity reference (EUVD-2025-27120)
CVE-2025-10090 | Jinher OA up to 1.2 GetTreeDate.aspx ID sql injection (EUVD-2025-27119)
Submit #644920: Shenzhen Jixiang Tenda Technology Co., Ltd. Tenda AC6 v2.0_V15.03.06.51 Buffer Overflow [Duplicate]
Cyber defense cannot be democratized
The democratization of AI has fundamentally lowered the barrier for threat actors, creating a bigger pool of people who can carry out sophisticated attacks. The so-called democratization of security, on the other hand, has resulted in chaos. The problem In an earnest attempt to shift left, security teams deputized developers to own remediation. While development teams have legitimately become more security-focused, it’s created a dynamic in which security is still accountable for risk but has … More →
The post Cyber defense cannot be democratized appeared first on Help Net Security.
Critical Argo CD API Flaw Exposes Repository Credentials to Attackers
A major security flaw has been discovered in Argo CD, a popular open-source tool used for Kubernetes GitOps deployments. The vulnerability allows project-level API tokens to expose sensitive repository credentials, such as usernames and passwords, to attackers. The issue has been classified as critical with a CVSS score of 9.8/10 and is tracked as CVE-2025-55190. The […]
The post Critical Argo CD API Flaw Exposes Repository Credentials to Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.