Aggregator
雷军为什么不学「友商」卷智驾?
DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords
A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language models (LLMs) like DeepSeek—has uncovered 11,908 live API keys, passwords, and credentials embedded in publicly accessible web pages. The leaked secrets, which authenticate successfully with services ranging from AWS to Slack and Mailchimp, highlight systemic risks in AI development pipelines […]
The post DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Infosec products of the month: February 2025
Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Armor, BigID, Dynatrace, Fortinet, Legit Security, Netwrix, Nymi, Palo Alto Networks, Pangea, Privacera, Qualys, SafeBreach, Satori, Seal Security, Socure, and Veeam Software. Qualys TotalAppSec enables organizations to address risks across web applications and APIs Qualys TotalAppSec unifies API security, web application scanning, and web malware detection across on-premises to hybrid and multi-cloud environments, providing companies with a comprehensive view … More →
The post Infosec products of the month: February 2025 appeared first on Help Net Security.
Олег Зайцев: креативная XSS-атака обошла защиту Fortune 500 компаний
CVE-2024-51485 | Ampache up to 7.0.0 Request cross-site request forgery
CVE-2024-51190 | TRENDnet TEW-651BR/TEW-652BRU /special_ap.htm ptRule_ApplicationName_1.1.6.0.0 cross site scripting
CVE-2024-51187 | TRENDnet TEW-651BR/TEW-652BRU Setting /firewall_setting.htm firewallRule_Name_1.1.1.0.0 cross site scripting
CVE-2024-51484 | Ampache up to 7.0.0 Request cross-site request forgery
CVE-2024-51490 | Ampache up to 7.0.0 Custom URL Logo Section cross site scripting (GHSA-x979-f6px-7j2w)
CVE-2024-51188 | TRENDnet TEW-651BR/TEW-652BRU /virtual_server.htm vsRule_VirtualServerName_1.1.10.0.0 cross site scripting
Weekly Update 441
Processing data breaches (especially big ones), can be extremely laborious. And, of course, everyone commenting on them is an expert, so there's a heap of opinions out there. And so it was with the latest stealer logs, a corpus of data that took the better part of a