Aggregator
谷歌以320亿美元收购Wiz,加速AI时代云安全与多云战略
Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit
Security researchers have confirmed that a critical remote code execution (RCE) vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is being actively exploited in the wild. The vulnerability, which enables attackers to take control of servers with a simple PUT request, was disclosed last week, and proof-of-concept exploits were published on GitHub merely 30 hours later. […]
The post Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit appeared first on Cyber Security News.
网信办等发布《人工智能生成合成内容标识办法》
人工智能生成合成内容标识包括显式标识和隐式标识。
显式标识是指在生成合成内容或者交互场景界面中添加的,以文字、声音、图形等方式呈现并可以被用户明显感知到的标识。
隐式标识是指采取技术措施在生成合成内容文件数据中添加的,不易被用户明显感知到的标识。
第四条 服务提供者提供的生成合成服务属于《互联网信息服务深度合成管理规定》第十七条第一款情形的,应当按照下列要求对生成合成内容添加显式标识:
(一)在文本的起始、末尾或者中间适当位置添加文字提示或者通用符号提示等标识,或者在交互场景界面、文字周边添加显著的提示标识;
(二)在音频的起始、末尾或者中间适当位置添加语音提示或者音频节奏提示等标识,或者在交互场景界面中添加显著的提示标识;
(三)在图片的适当位置添加显著的提示标识;
(四)在视频起始画面和视频播放周边的适当位置添加显著的提示标识,可以在视频末尾和中间适当位置添加显著的提示标识;
(五)呈现虚拟场景时,在起始画面的适当位置添加显著的提示标识,可以在虚拟场景持续服务过程中的适当位置添加显著的提示标识;
(六)其他生成合成服务场景根据自身应用特点添加显著的提示标识。
服务提供者提供生成合成内容下载、复制、导出等功能时,应当确保文件中含有满足要求的显式标识。
第十条 用户使用网络信息内容传播服务发布生成合成内容的,应当主动声明并使用服务提供者提供的标识功能进行标识。
任何组织和个人不得恶意删除、篡改、伪造、隐匿本办法规定的生成合成内容标识,不得为他人实施上述恶意行为提供工具或者服务,不得通过不正当标识手段损害他人合法权益。
微软警告:新型RAT木马StilachiRAT窃取凭证与加密钱包
Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS
Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS
madhav
Tue, 03/18/2025 - 04:20
Oracle and Thales are excited to announce CipherTrust Cloud Key Management’s (CCKM) support for Oracle Cloud Infrastructure‘s (OCI) new cross-site replication functionality for its Dedicated Region Cloud@Customer and OCI Alloy offerings. Cross-site replication with OCI Vault EKMS and Thales CipherTrust Cloud Key Management facilitates secure, customer-controlled encryption and key management across multiple connected DRCC and Alloy sites.
So far, 2025 has been nothing short of unpredictable. Geopolitical uncertainty and the subsequent effects on confidence in the global economy have renewed customer emphasis on remaining in control of their operations and mitigating risks both known and unknown. Contributing to this uncertainty is the growing tension from the rapid advancements in AI and quantum computing - probably best illustrated by DeepSeek’s surprise progress announcement which turned conventional AI orthodoxy on its head. Customers need control of their data, but they must also continue to innovate with the latest cloud technologies to remain competitive in a quickly evolving global context. To say this is tricky is a massive understatement.
It is against this backdrop that Oracle and Thales collaborate to expand our customer-controlled “Hold Your Own Key” integration using OCI Vault EKMS.
What does this mean for customers?
In short, it means they can continue to own and centrally control their data in more extensive and more complex OCI DRCC and Alloy deployments. Phase one of the integration with with OCI Vault EKMS allowed customers to externally store and control master keys securing OCI based data in a Thales cloud-based service, or virtual or physical appliance. Now, in phase two, the same Alloy and DRCC EKMS master keys on CipherTrust Cloud Key Management will be accessible from the additional sites that customers use for back-up and disaster recovery. CCKM offers seamless OCI Vault EKMS failover preventing any interruption in service when using cross-region replication. This year, cross-site replication will also support Fusion SaaS apps to broaden the number of cases where customers can control their encryption keys in OCI.
Beyond the essential questions of control, our new joint release also simplifies encryption key administration by making the keys from multiple clouds and services manageable from the same console.
All of these benefits accrue to customers using CipherTrust Cloud Key Management for OCI DRCC, but they additionally accrue to the customers who choose to purchase OCI Alloy-based services. Alloy is designed for service providers and large public sector customers who intend to host and manage their own type of service offering, giving end-users greater controlWhether it’s a telecom company using Alloy to provide a dedicated business cloud or a government building a national sovereign cloud the same separation of duties principals apply. End customers want to remain in control of their data irrespective of where it resides. With Thales those customers get to manage and control their Alloy keys in the same place as they would the keys they use on-premises or in their other cloud infrastructure.
Game Changing Security
Despite my best efforts, this blog post doesn’t capture the magnitude of what Oracle and Thales are able to offer these customers today. Oracle’s innovative approach to cloud – and specifically to private cloud initiatives geared toward large enterprise customers – is changing the game. Tying together their innovations in this space to allow for centralized data-at-rest security management changes the scale at which customers will design and build their own digitally sovereign offerings. There is more in store. Oracle and Thales continue to collaborate to make the cloud more secure, agile, and innovative. Stay tuned for exciting things ahead.
To learn more about the Thales and Oracle partnership please visit
OCI Key Management for Digital Sovereignty & Compliance Requirements
Alex Hanway | Director of Business Development
More About This Author >
Schema
{
"@context": "https://schema.org",
"@type": "BlogPosting",
"mainEntityOfPage": {
"@type": "WebPage",
"@id": "https://cpl.thalesgroup.com/blog/encryption/oci-vault-ekms-thales-cckm-integration
"
},
"headline": "Enhancing OCI Vault EKMS with Thales CCKM Integration",
"description": "Discover how Thales CCKM enhances OCI Vault EKMS, enabling secure, customer-controlled encryption, cross-site replication, and centralized key management.",
"image": "",
"author": {
"@type": "Person",
"name": "Alex Hanway",
"url": "https://cpl.thalesgroup.com/blog/author/ahanway"
},
"publisher": {
"@type": "Organization",
"name": "Thales Group",
"description": "The world relies on Thales to protect and secure access to your most sensitive data and software wherever it is created, shared, or stored. Whether building an encryption strategy, licensing software, providing trusted access to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.",
"url": "https://cpl.thalesgroup.com",
"logo": "https://cpl.thalesgroup.com/sites/default/files/content/footer/thaleslogo-white.png",
"sameAs": [
"https://www.facebook.com/ThalesCloudSec",
"https://www.twitter.com/ThalesCloudSec",
"https://www.linkedin.com/company/thalescloudsec",
"https://www.youtube.com/ThalesCloudSec"
]
},
"datePublished": "2025-03-18",
"dateModified": "2025-03-18"
}
The post Unlocking Data Control Across Regions: Oracle and Thales Enhance CipherTrust Cloud Key Management for OCI Vault EKMS appeared first on Security Boulevard.