Aggregator
CVE-2025-64143 | OpenShift Pipeline Plugin up to 1.0.57 on Jenkins Controller File System permission
CVE-2025-64142 | Nexus Task Runner Plugin up to 0.9.2 on Jenkins permission
CVE-2025-64140 | Azure CLI Plugin up to 0.9 on Jenkins os command injection
CVE-2025-64135 | Eggplant Runner Plugin up to 0.0.1.301.v963cffe8ddb_8 on Jenkins insecure default initialization of resource
CVE-2025-64132 | MCP Server Plugin up to 0.84.v50ca_24ef83f2 on Jenkins permission
CVE-2025-64131 | SAML Plugin up to 4.583.vc68232f7018a_ on Jenkins improper authentication
CVE-2024-45161 | Blu-Castle BCUM221E 1.0.0P2205 Image cross-site request forgery
CVE-2025-10932 | Progress MOVEit Transfer up to 2023.1.15/2024.1.6/2025.0.2 AS2 Module resource consumption
CVE-2025-40085 | Linux Kernel up to 6.18-rc1 usb-audio try_to_register_card null pointer dereference
CVE-2023-7324 | Linux Kernel up to 6.2.2 scsi ses_enclosure_data_process out-of-bounds
CVE-2025-40084 | Linux Kernel up to 6.1.157/6.6.114/6.12.55/6.17.5 ksmbd handle_response null pointer dereference
CVE-2025-40083 | Linux Kernel sched sch_qfq null pointer dereference
Observability for the “Always On” Power Industry
Microsoft fixes 0x800F081F errors causing Windows update failures
Нейтрино — шпионы из прошлого? Эти частицы могли «сбежать» из непрозрачной Вселенной раньше света. Теперь их ищут.
Attestation-Based Identity: How It Works and Why It Matters
7 min readInstead of just trusting the token's signature, attestation-based identity adds an extra layer of security. It cryptographically verifies that the workload is running exactly where and how it's supposed to. It's proof of location and configuration, not just a signature.
The post Attestation-Based Identity: How It Works and Why It Matters appeared first on Aembit.
The post Attestation-Based Identity: How It Works and Why It Matters appeared first on Security Boulevard.
Fortra DSPM helps organizations protect sensitive data across hybrid cloud
Fortra announced the launch of its new Data Security Posture Management (DSPM) solution to enable organizations to discover, classify, and protect sensitive data across their hybrid cloud. Fortra DSPM strengthens the company’s security portfolio by helping enterprises maintain visibility and control over their data. As organizations embrace hybrid cloud architectures, sensitive data continues to proliferate across countless shadow repositories, applications, and environments. The threat landscape demands that businesses not only know where their critical data … More →
The post Fortra DSPM helps organizations protect sensitive data across hybrid cloud appeared first on Help Net Security.
LLM 与安全代码
《LLM与代码安全》由北京大学博士生王滨撰写,聚焦大模型在代码生成中的安全挑战与防护实践。文章指出,尽管LLM极大提升了开发效率,但其生成的代码存在漏洞密度高、供应链投毒、武器化滥用等风险。作者团队提出A.S.E项目级评测基准、REFLEXGEN自修正框架、RA-Gen多智能体方案等实践路径,并开源AI-Infra-Guard平台,推动生成代码的安全性评估与加固,呼吁行业重视AI代码生成的第一战场安全。
Commvault introduces Data Rooms to securely connect backup data with AI platforms
Commvault introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI platforms they rely on, or to their own AI initiatives, such as internal data lakes. By combining governed, self-service access with built-in classification and compliance controls, Data Rooms bridges the gap between data protection and data activation, helping organizations transform backup data into AI-ready assets without adding new risk or complexity. As enterprises accelerate AI … More →
The post Commvault introduces Data Rooms to securely connect backup data with AI platforms appeared first on Help Net Security.