Aggregator
CVE-2026-22779 | Neoteroi BlackSheep up to 2.4.5 response splitting (GHSA-6pw3-h7xf-x4gp / EUVD-2026-2451)
CVE-2024-30401 | Juniper Junos OS up to 22.2R1 on MX Advanced Forwarding Management out-of-bounds (JSA79110)
CVE-2024-50526 | Mahlamusa Multi Purpose Mail Form Plugin up to 1.0.2 on WordPress unrestricted upload
CVE-2021-47749 | YouPHPTube up to 7.8 locale/function.php lang path traversal (Exploit 51101 / EDB-51101)
CVE-2025-37176 | HPE ArubaOS up to 8.10.0.20/8.13.1.0 command injection (EUVD-2026-2046)
CVE-2024-9932 | Wux Blog Editor Plugin up to 3.0.0 on WordPress unrestricted upload
Hackers exploit critical telnetd auth bypass flaw to get root
TikTok переобулся. Теперь это официально «американский» сервис (но китайцы все еще где-то рядом)
The New Rules of Cyber Resilience in an AI-Driven Threat Landscape
For years, cybersecurity strategy revolved around a simple goal: keep attackers out. That mindset no longer matches reality. Today’s threat landscape assumes compromise. Adversaries do not just encrypt data and demand payment. They exfiltrate it, resell it, reuse it, and weaponize it long after the initial breach. As we look toward 2026, cyber resilience, not..
The post The New Rules of Cyber Resilience in an AI-Driven Threat Landscape appeared first on Security Boulevard.
CVE-2021-20251 | Samba Bad Password Lockout race condition (Nessus ID 296132)
CVE-2016-9843 | Oracle Database 18c Core RDBMS numeric error (Nessus ID 296164 / ID 351434)
CVE-2024-27435 | Linux Kernel up to 5.12/6.1.82/6.6.22/6.7.10/6.8.1 nvme allocation of resources (Nessus ID 296165 / WID-SEC-2024-1188)
CVE-2024-36965 | Linux Kernel up to 5.15.159/6.1.91/6.6.31/6.8.10/6.9.1 mediatek memory corruption (Nessus ID 296166)
CVE-2024-27432 | Linux Kernel up to 5.15.152/6.1.82/6.6.22/6.7.10/6.8.1 Ethernet mtk_ppe_stop denial of service (Nessus ID 296181 / WID-SEC-2024-1188)
Shift Left QA for AI Systems. Catching Model Risk Before Production
Artificial intelligence (AI) systems rarely fail in obvious ways. No red error screen. No crashed service. No broken button. They fail quietly. Outputs look confident...Read More
The post Shift Left QA for AI Systems. Catching Model Risk Before Production appeared first on ISHIR | Custom AI Software Development Dallas Fort-Worth Texas.
The post Shift Left QA for AI Systems. Catching Model Risk Before Production appeared first on Security Boulevard.
NDSS 2025 – Attributing Open-Source Contributions Is Critical But Difficult
Session 9D: Github + OSN Security
Authors, Creators & Presenters: Jan-Ulrich Holtgrave (CISPA Helmholtz Center for Information Security), Kay Friedrich (CISPA Helmholtz Center for Information Security), Fabian Fischer (CISPA Helmholtz Center for Information Security), Nicolas Huaman (Leibniz University Hannover), Niklas Busch (CISPA Helmholtz Center for Information Security), Jan H. Klemmer (CISPA Helmholtz Center for Information Security), Marcel Fourné (Paderborn University), Oliver Wiese (CISPA Helmholtz Center for Information Security), Dominik Wermke (North Carolina State University), Sascha Fahl (CISPA Helmholtz Center for Information Security)
PAPER
Attributing Open-Source Contributions is Critical but Difficult: A Systematic Analysis of GitHub Practices and Their Impact on Software Supply Chain Security
Critical open-source projects form the basis of many large software systems. They provide trusted and extensible implementations of important functionality for cryptography, compatibility, and security. Verifying commit authorship authenticity in open-source projects is essential and challenging. Git users can freely configure author details such as names and email addresses. Platforms like GitHub use such information to generate profile links to user accounts. We demonstrate three attack scenarios malicious actors can use to manipulate projects and profiles on GitHub to appear trustworthy. We designed a mixed-research study to assess the effect on critical open-source software projects and evaluated countermeasures. First, we conducted a large-scale measurement among 50,328 critical open-source projects on GitHub and demonstrated that contribution workflows can be abused in 85.9% of the projects. We identified 573,043 email addresses that a malicious actor can claim to hijack historic contributions and improve the trustworthiness of their accounts. When looking at commit signing as a countermeasure, we found that the majority of users (95.4%) never signed a commit, and for the majority of projects (72.1%), no commit was ever signed. In contrast, only 2.0% of the users signed all their commits, and for 0.2% of the projects all commits were signed. Commit signing is not associated with projects' programming languages, topics, or other security measures. Second, we analyzed online security advice to explore the awareness of contributor spoofing and identify recommended countermeasures. Most documents exhibit awareness of the simple spoofing technique via Git commits but no awareness of problems with GitHub's handling of email addresses.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Attributing Open-Source Contributions Is Critical But Difficult appeared first on Security Boulevard.
Bending Spoons 解雇了几乎所有 Vimeo 员工
SecWiki News 2026-01-23 Review
我对流量安全风险感知的思考和实践 by ourren
2026汽车及智能化设备网络安全威胁报告 by ourren
杀伤链与作战管理深化研究 by ourren
国外星间组网技术发展调研报告 by ourren
Annual Security Reports 年度安全报告 by ourren
2025年全球国防网络空间情况综述(演习竞赛篇) by ourren
更多最新文章,请访问SecWiki