Aggregator
CVE-2024-47748 | Linux Kernel up to 6.11.1 vhost_vdpa irq_bypass_unregister_producer use after free (Nessus ID 210938 / WID-SEC-2024-3251)
CVE-2024-47746 | Linux Kernel up to 6.10.12/6.11.1 fuse locking (fa4890bd8237/4e181761ffec/2f3d8ff45798 / Nessus ID 216493)
CVE-2024-47745 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 security_mmap_file data authenticity (Nessus ID 210940 / WID-SEC-2024-3251)
CVE-2024-47747 | Linux Kernel up to 6.11.1 ether3_probe use after free (Nessus ID 210940 / WID-SEC-2024-3251)
CVE-2024-47744 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 __kvmclock_cpufreq_notifier deadlock (Nessus ID 216493 / WID-SEC-2024-3251)
A new European standard outlines security requirements for AI
The European Telecommunications Standards Institute (ETSI) has released a new European Standard that addresses a growing concern for security teams working with AI. The standard, ETSI EN 304 223, sets baseline cybersecurity requirements for AI models and systems intended for real-world use. Addressing security risks specific to AI ETSI EN 304 223 treats AI as a distinct category of technology from a security perspective. AI systems introduce risks tied to their data pipelines, model behavior, … More →
The post A new European standard outlines security requirements for AI appeared first on Help Net Security.
工信部:网络和数据安全治理能力有效提升
GoBruteforcer僵尸网络新攻势:利用AI生成配置漏洞 瞄准加密货币数据库
Привет из 90-х. В главной библиотеке Linux нашли уязвимость, которая пряталась там 30 лет
CVE-2023-38378 | RIGOL SO5000 Digital Oscilloscope 00.01.03.00.03 Web Interface changepwd.cgi pass1 os command injection (EUVD-2023-42195)
CVE-2023-38379 | RIGOL SO5000 Digital Oscilloscope 00.01.03.00.03 Admin Password changepwd.cgi pass0 improper authentication (EUVD-2023-42196)
CVE-2023-38357 | RWS WorldServer 11.7.3 Session Token user session (ID 173609 / EUVD-2023-42174)
CVE-2023-38356 | MiniTool Power Data Recovery 11.6 Installation channel accessible (EUVD-2023-42173)
CVE-2023-38354 | MiniTool Movie Maker 4.1 Installation channel accessible (EUVD-2023-42171)
CVE-2023-38355 | MiniTool Movie Maker up to 6.1.0 Installation channel accessible (EUVD-2023-42172)
CVE-2026-1137 | UTT 进取 520W 1.7.7-180627 formWebAuthGlobalConfig strcpy buffer overflow
CVE-2026-1138 | UTT 进取 520W 1.7.7-180627 /goform/ConfigExceptQQ strcpy buffer overflow
CVE-2026-1139 | UTT 进取 520W 1.7.7-180627 /goform/ConfigExceptMSN strcpy buffer overflow
When the Olympics connect everything, attackers pay attention
Global sporting events bring a surge of network traffic, new systems, and short term partnerships. That mix draws attention from cyber threat actors who see opportunity in scale and distraction. A new Palo Alto Networks threat study on the Milan Cortina 2026 Winter Olympic Games outlines how attackers are expected to operate across the event’s digital ecosystem, from ticketing platforms to telecom infrastructure. A target-rich environment Large events depend on fast deployment. Temporary venues, pop … More →
The post When the Olympics connect everything, attackers pay attention appeared first on Help Net Security.