Aggregator
Нет отопления, -8°C, зато сотни лайков. Венгерские власти нашли способ быстро «исправить» недовольство граждан
Detecting and Monitoring OpenClaw (clawdbot, moltbot), (Tue, Feb 3rd)
Солнечный пулемет: 27 выстрелов за сутки. Наша звезда перешла в режим непрерывной бомбардировки по Земле
美载人绕月飞行任务综合演练中止 发射推迟
G.O.S.S.I.P 阅读推荐 2026-02-03 崛起(却不安全)的小程序
Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
APT28 exploits Microsoft Office flaw in Operation Neusploit
APT28 exploits Microsoft Office flaw in Operation Neusploit
Ракеты, которые не взрываются, а выключают. Китай ослепил иностранную авиацию
Microsoft is Giving the FBI BitLocker Keys
Sandisk brings SPRandom to open source for large SSD testing
Enterprise storage environments already run long qualification cycles as solid-state drive capacities rise and validation teams try to mirror production workloads. Preconditioning steps now consume days of lab time for a single device, especially in data centers supporting AI training, analytics, and large-scale databases. High-capacity enterprise SSDs now reach 256TB and higher. These capacities change how vendors and customers approach testing before deployment. Preconditioning places a drive into steady state so that performance and endurance … More →
The post Sandisk brings SPRandom to open source for large SSD testing appeared first on Help Net Security.
日本运用AI开展业务的国内企业大幅增加
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2019-19006 Sangoma FreePBX Improper Authentication Vulnerability
- CVE-2021-39935 GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
- CVE-2025-40551 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- CVE-2025-64328 Sangoma FreePBX OS Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.