Aggregator
.NET 一款内网渗透环境下切换不同身份启动进程的工具
2 months 3 weeks ago
Twitter/X 将使用用户帖子训练 AI,这一次用户无法退出
2 months 3 weeks ago
Twitter/X 更新了其服务条款,包括以下声明“你同意本许可包括我们以下权利:(i) 分析你提供的文本和其他信息,以及以其他方式提供、推广和改进服务,例如,包括用于和训练我们的机器学习和人工智能模型(无论是生成式模型还是其他类型的模型);(ii) 将提交给或通过服务提交的内容提供给其他公司、组织或个人,例如,包括改进服务以及在其他媒体和服务上联合、广播、分发、转帖、推广或发布此类内容,但须遵守我们关于此类内容使用的条款和条件。我们或其他公司、组织或个人进行此类额外使用时,不会就你通过服务提交、发布、传输或以其他方式提供的内容向你支付任何补偿,因为你对服务的使用在此会被视为对内容的充分补偿,并在此授予权利。”Twitter/X 此前的服务条款已经声明它会使用用户内容训练其 AI 模型,但允许用户选择退出,新的服务条款用户无法退出。新服务条款将于 11 月 15 日生效。
如何构建公安视频传输网络安全防护屏障?
2 months 3 weeks ago
为公共安全视频监控体系的稳定运行和信息安全传递保驾护航。
Hacker allegedly behind attacks on FBI, Airbus, National Public Data arrested in Brazil
2 months 3 weeks ago
Federal law enforcement in Brazil arrested a hacker allegedly behind several brazen, high-profile c
Cognizant Neuro Cybersecurity enhances threat detection and response
2 months 3 weeks ago
Cognizant announced the debut of Cognizant Neuro Cybersecurity, a new addition to Cognizant’s Neuro suite of platforms, designed to amplify cybersecurity resilience by integrating and orchestrating point cybersecurity solutions across the enterprise. Sophisticated threat actors, hybrid workforces, and the complexity of managing multiple security tools all weigh on an enterprise’s ability to manage cybersecurity risks. Traditional siloed technology and operations often lack the ability to deliver the insights that enable rapid decisions to preserve security … More →
The post Cognizant Neuro Cybersecurity enhances threat detection and response appeared first on Help Net Security.
Industry News
浅谈LLM时代下的REST API自动化测试
2 months 3 weeks ago
AIVD en RDI: impact van generatieve AI vraagt om een nieuwe benadering cybersecurity
2 months 3 weeks ago
De Algemene Inlichtingen- en Veiligheidsdienst (AIVD) en de Rijksinspectie Digitale Infrastructuur (RDI) hebben vandaag een gezamenlijke publicatie uitgebracht, Generatieve AI: een transformatieve impact op cybersecurity. De publicatie laat zien welke nieuwe uitdagingen generatieve AI met zich meebrengt voor cybersecurity en biedt een model om met deze uitdagingen om te gaan.
美国高科技企业人事任命动态(2024年9月更新)
2 months 3 weeks ago
随着科技的快速发展,美国高科技企业在人工智能、网络安全、国防和公共服务等领域的人事任命显得尤为重要。
如何通过电话号码获取情报?
2 months 3 weeks ago
Конец игры USDoD: как поймали неуловимого хакера
2 months 3 weeks ago
Взломщик баз данных ФБР и CrowdStrike наконец арестован.
AI时代,OPPO带来端云结合的体系化安全守护方案
2 months 3 weeks ago
OPPO针对隐私安全放出了一系列“大招”,其不仅打造了行业首个全链路反诈,还成为了除苹果外唯二支持私密云计算的手机厂商。
CVE-2024-3186 | EmbedThis GoAhead up to 6.0.0 Javascript Template evalExpr null pointer dereference
2 months 3 weeks ago
A vulnerability was found in EmbedThis GoAhead up to 6.0.0. It has been classified as problematic. This affects the function evalExpr of the component Javascript Template Handler. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-3186. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-3184 | EmbedThis GoAhead up to 6.0.0 Request null pointer dereference
2 months 3 weeks ago
A vulnerability was found in EmbedThis GoAhead up to 6.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Request Handler. The manipulation leads to null pointer dereference.
This vulnerability is handled as CVE-2024-3184. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2024-3187 | EmbedThis GoAhead up to 6.0.0 JST Value use after free
2 months 3 weeks ago
A vulnerability has been found in EmbedThis GoAhead up to 6.0.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component JST Value Handler. The manipulation leads to use after free.
This vulnerability is known as CVE-2024-3187. The attack can be launched remotely. There is no exploit available.
vuldb.com
CVE-2024-10073 | flairNLP flair 0.14.0 Mode File Loader clustering.py ClusteringModel code injection
2 months 3 weeks ago
A vulnerability, which was classified as critical, was found in flairNLP flair 0.14.0. Affected is the function ClusteringModel of the file flair\models\clustering.py of the component Mode File Loader. The manipulation leads to code injection.
This vulnerability is traded as CVE-2024-10073. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
Submit #420055: flairNLP flair v0.14.0 Code Injection [Accepted]
2 months 3 weeks ago
Submit #420055 / VDB-280722
runshen.gao
CVE-2024-10072 | ESAFENET CDG 5 EncryptPolicyService.java actionAddEncryptPolicyGroup checklist sql injection
2 months 3 weeks ago
A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5. This issue affects the function actionAddEncryptPolicyGroup of the file /com/esafenet/servlet/policy/EncryptPolicyService.java. The manipulation of the argument checklist leads to sql injection.
The identification of this vulnerability is CVE-2024-10072. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-10071 | ESAFENET CDG 5 EncryptPolicyService.java actionUpdateEncryptPolicyEdit encryptPolicyId sql injection
2 months 3 weeks ago
A vulnerability classified as critical was found in ESAFENET CDG 5. This vulnerability affects the function actionUpdateEncryptPolicyEdit of the file /com/esafenet/servlet/policy/EncryptPolicyService.java. The manipulation of the argument encryptPolicyId leads to sql injection.
This vulnerability was named CVE-2024-10071. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-10070 | ESAFENET CDG 5 PolicyPushControlAction.java actionPolicyPush policyId sql injection
2 months 3 weeks ago
A vulnerability classified as critical has been found in ESAFENET CDG 5. This affects the function actionPolicyPush of the file /com/esafenet/policy/action/PolicyPushControlAction.java. The manipulation of the argument policyId leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-10070. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com