Aggregator
CVE-2025-39868 | Linux Kernel up to 6.16.7/6.17-rc5 erofs truncate_folio_batch_exceptionals infinite loop (Nessus ID 265869 / WID-SEC-2025-2107)
CVE-2022-49421 | Linux Kernel up to 5.18.2 of_parse_phandle reference count (WID-SEC-2025-2107)
CVE-2022-49417 | Linux Kernel up to 5.17.13/5.18.2 iwlwifi null pointer dereference (WID-SEC-2025-2107)
CVE-2022-49415 | Linux Kernel up to 5.18.2 of_parse_phandle reference count (Nessus ID 250149 / WID-SEC-2025-2107)
CVE-2022-49409 | Linux Kernel up to 5.4.276/5.10.120/5.15.45/5.17.13/5.18.2 fs/ext4/extents_status.c __es_tree_search information disclosure (Nessus ID 238226 / WID-SEC-2025-2107)
CVE-2026-2535 | Comfast CF-N1 V2 2.6.0.2 mbox-config?method=SET§ion=ptest_channel sub_44AB9C command injection
CVE-2026-2536 | opencc JFlow up to 20260129 Workflow Engine WF_Admin_AttrFlow.java Imp_Done File xml external entity reference (IDN7GT)
CVE-2026-2537 | Comfast CF-E4 2.6.0.1 HTTP POST Request mbox-config?method=SET§ion=ntp_timezone timestr command injection
New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released
Взлом суперкомпьютера за пять минут. 20-летняя уязвимость даёт почувствовать себя хакером из «Матрицы»
Apple privacy labels often don’t match what Chinese smart home apps do
Smart home devices in many homes collect audio, video, and location data. The apps that control those devices often focus on the account owner, even when the technology also captures guests, neighbors, and other people who never agreed to be monitored. New research examined whether Chinese smart home apps provide privacy protections for these bystanders. The study reviewed 49 apps available in Apple’s App Store in mainland China and found consistent gaps in bystander privacy, … More →
The post Apple privacy labels often don’t match what Chinese smart home apps do appeared first on Help Net Security.
ГУЛАГ в вашем телефоне. Азиатские картели построили глобальный конвейер рабства, который невозможно остановить
In GitHub’s advisory pipeline, some advisories move faster than others
GitHub Security Advisories are used to distribute vulnerability information in open-source projects and security tools. A new study finds that only a portion of those advisories ever pass through GitHub’s formal review process. A large scale view of advisory data A review of GitHub Security Advisories published between 2019 and 2025 examined 288,604 advisories. Of those, 23,563, about 8%, completed GitHub’s review process. Although most advisories remain unreviewed, reviewed entries play an outsized role in … More →
The post In GitHub’s advisory pipeline, some advisories move faster than others appeared first on Help Net Security.
Don’t panic over CISA’s KEV list, use it smarter
In this Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains what CISA’s Known Exploited Vulnerabilities (KEV) Catalog is and how security teams should use it. He shares his perspective as a former section chief for KEV at CISA and breaks down common misunderstandings about what the list represents. He points out that not every KEV item is equally urgent. Some vulnerabilities require local access or existing privileges, while others allow … More →
The post Don’t panic over CISA’s KEV list, use it smarter appeared first on Help Net Security.
指纹浏览器行业安全风险深度分析
Скачали модный ChatGPT-клон из Chrome Store? Поздравляем — все ваши логины и пароли уже на серверах мошенников
Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability
In this episode, we discuss two major tech stories impacting privacy and security. First, we analyze Ring’s new AI-powered ‘Search Party’ feature and its controversial Super Bowl ad that sparked privacy concerns. We then transition to a breaking story about a zero-click remote code execution flaw in the Claude Desktop, highlighting the potential risks of […]
The post Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability appeared first on Shared Security Podcast.
The post Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability appeared first on Security Boulevard.
MOS: Open-source modular OS for servers and homelabs
A growing number of homelab builders and small server operators are testing an open source operating system that combines basic server management, storage control, and container services under a web interface. MOS is a free modular OS built on a Devuan base that provides a web UI and API for system monitoring, storage pooling, container orchestration, and virtualization. Web UI and API for server and homelab management MOS presents a browser-accessible dashboard that gives status … More →
The post MOS: Open-source modular OS for servers and homelabs appeared first on Help Net Security.