Aggregator
CVE-2025-38042 | Linux Kernel up to 6.14.8 dmaengine k3-cppi-desc-pool.c k3_udma_glue_reset_rx_chn skip_fdq state issue (Nessus ID 265934 / WID-SEC-2025-1350)
CVE-2025-38040 | Linux Kernel up to 6.1.140/6.6.92/6.12.30/6.14.8 kernel/irq/manage.c in_atomic stack-based overflow (Nessus ID 241773 / WID-SEC-2025-1350)
CVE-2023-42321 | iCMS 7.0.16 user.admincp.php cross-site request forgery (EUVD-2023-46774)
CVE-2023-42322 | iCMS 7.0.16 information disclosure (EUVD-2023-46775)
CVE-2023-42320 | Tenda AC10V4 US_AC10V4.0si_V16.03.10.13_cn_TDC01 GetParentControlInfo mac buffer overflow (EUVD-2023-46773)
CVE-2023-42299 | OpenImageIO oiio 2.4.12.0 read_subimage_data denial of service (Issue 3840 / EUVD-2023-46753)
CVE-2023-42307 | code-projects Exam Form Submission 1.0 Subject Name/Subject Code cross site scripting (EUVD-2023-46761)
Blue Origin 专注于月球项目放弃亚轨道旅游
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
What boards need to hear about cyber risk, and what they don’t
In this Help Net Security video, Rishi Kaushal, CIO at Entrust, explains how security leaders should talk to the board about cyber risk. He focuses on what matters to board members and what does not. He links cryptography, certificates, and authentication to business outcomes like revenue loss, outages, fraud, and regulatory exposure. Kaushal breaks down the digital trust layer and explains why failures in keys, certificates, or access controls often lead to visible business damage. … More →
The post What boards need to hear about cyber risk, and what they don’t appeared first on Help Net Security.
过去四个月比特币从峰值下跌了四成
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
AI is flooding IAM systems with new identities
Most organizations view AI identities through the same lens used for other non-human identities, such as service accounts, API keys, and chatbots, according to The State of Non-Human Identity and AI Security report by the Cloud Security Alliance. AI identities inherit old IAM weaknesses Treating AI identities as another category of non-human identity means they inherit the same weaknesses that have affected identity programs for years. Credential sprawl, unclear ownership, and uneven lifecycle controls already … More →
The post AI is flooding IAM systems with new identities appeared first on Help Net Security.
Why Gen Z is Ditching Smartphones for Dumbphones
Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functions as your wallet, your memory, and your security key? In this episode, Tom and Scott explore the dumbphone movement through a privacy and […]
The post Why Gen Z is Ditching Smartphones for Dumbphones appeared first on Shared Security Podcast.
The post Why Gen Z is Ditching Smartphones for Dumbphones appeared first on Security Boulevard.