Aggregator
先知安全沙龙 - 西安站 11月15日开启!
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
英伟达成为第一家市值突破 5 万亿美元的公司
Блогер вскрыл «неуязвимый» замок за 3 сек. Суд заливается смехом, производитель — кричит о клевете, пока интернет смеётся ещё громче
CVE-2019-1069 | Microsoft Windows up to Server 2019 Task Scheduler access control (ID 91544)
CVE-2021-31693 | 10Web Photo Gallery Plugin up to 1.5.68 on WordPress cross site scripting (ID 162227)
CVE-2024-25646 | SAP BusinessObjects Web Intelligence Document information disclosure
CVE-2024-37180 | SAP NetWeaver Application Server for ABAP and ABAP Platform information disclosure
CVE-2019-1064 | Microsoft Windows up to Server 2019 AppXSVC access control (ID 91544)
CVE-2023-22745 | Trusted Computing Group tpm2-tss Tss2_RC_SetHandler/Tss2_RC_Decode buffer overflow (GHSA-4j3v-fh23-vx67 / Nessus ID 236580)
CVE-2020-0878 | Microsoft ChakraCore/Edge memory corruption
CVE-2020-0878 | Microsoft Internet Explorer 9/11 memory corruption
CVE-2022-48635 | Linux Kernel up to 5.15.70/5.19.11/6.0 fsdax fs/iomap/iter.c dax_iomap_rw infinite loop (929ef155e1da/60644dffac87/17d9c15c9b9e / Nessus ID 237278)
CVE-2023-37541 | HCL Connections 7.0/8.0 access control (KB0114156)
Transforming Software Compliance with AI SBOM Management
If your software serves federal missions, you face twin pressures to move faster and prove exactly what's in your software.
The post Transforming Software Compliance with AI SBOM Management appeared first on Security Boulevard.
CVE-2025-11587 | jgrietveld Call Now Button Plugin up to 1.5.3 on WordPress authorization (EUVD-2025-36639)
CVE-2025-11632 | jgrietveld Call Now Button Plugin up to 1.5.4 on WordPress authorization (EUVD-2025-36640)
LASCON XV: From AI Risk To Identity Security In AppSec
From ITDR to MCP, LASCON XV in Austin showed how AppSec must evolve to address identity threats, AI challenges, and the complexity of modern production systems.
The post LASCON XV: From AI Risk To Identity Security In AppSec appeared first on Security Boulevard.
NDSS 2025 – Revealing The Black Box Of Device Search Engine Session 1B: Internet Security
Authors, Creators & Presenters: Mengying Wu (Fudan University), Geng Hong (Fudan University), Jinsong Chen (Fudan University), Qi Liu (Fudan University), Shujun Tang (QI-ANXIN Technology Research Institute; Tsinghua University), Youhao Li (QI-ANXIN Technology Research Institute), Baojun Liu (Tsinghua University), Haixin Duan (Tsinghua University; Quancheng Laboratory), Min Yang (Fudan University)
PAPER Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration
In the digital age, device search engines such as Censys and Shodan play crucial roles by scanning the internet to catalog online devices, aiding in the understanding and mitigation of network security risks. While previous research has used these tools to detect devices and assess vulnerabilities, there remains uncertainty regarding the assets they scan, the strategies they employ, and whether they adhere to ethical guidelines. This study presents the first comprehensive examination of these engines' operational and ethical dimensions. We developed a novel framework to trace the IP addresses utilized by these engines and collected 1,407 scanner IPs. By uncovering their IPs, we gain deep insights into the actions of device search engines for the first time and gain original findings. By employing 28 honeypots to monitor their scanning activities extensively in one year, we demonstrate that users can hardly evade scans by blocklisting scanner IPs or migrating service ports. Our findings reveal significant ethical concerns, including a lack of transparency, harmlessness, and anonymity. Notably, these engines often fail to provide transparency and do not allow users to opt out of scans. Further, the engines send malformed requests, attempt to access excessive details without authorization, and even publish personally identifiable information(PII) and screenshots on search results. These practices compromise user privacy and expose devices to further risks by potentially aiding malicious entities. This paper emphasizes the urgent need for stricter ethical standards and enhanced transparency in the operations of device search engines, offering crucial insights into safeguarding against invasive scanning practices and protecting digital infrastructures.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the organization’s’ YouTube channel.
The post NDSS 2025 – Revealing The Black Box Of Device Search Engine Session 1B: Internet Security appeared first on Security Boulevard.