Aggregator
CVE-2025-23252 | NVIDIA NVDebug Tool 1.6.0 internal asset exposed to unsafe debug access level or state
CVE-2025-49843 | conda-forge conda-smithy up to 3.47.0 Configuration File travis_headers default permission (GHSA-h9v8-rrqg-3m95)
CVE-2025-49847 | ggml-org llama.cpp llama.cpp/src/vocab.cpp token_to_piece memory corruption (GHSA-8wwf-w4qm-gpqr)
Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF, when utilized by the graduated CNCF Cilium and its sub-project Tetragon, combined with Software Bills of Materials (SBOMs), can provide insights and a security feedback loop for modern systems. We’ll create a container image and its SBOM. We’ll then launch it, simulate a breach, and see how our eBPF-based setup with Tetragon captures the issue. … More →
The post Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security appeared first on Help Net Security.
CVE-2025-45525 | microlight 0.0.7 Color Value microlight.js null pointer dereference
CVE-2025-49825 | teleport Community Edition up to 17.5.1 authorization (GHSA-8cqv-pj7f-pwpc)
CVE-2025-45526 | microlight 0.0.7 microlight.js reset denial of service
CVE-2025-34511 | Sitecore Experience Manager/Experience Platform up to 7.0 Powershell Extension unrestricted upload (EUVD-2025-18568)
CVE-2025-49214 | Trend Micro Endpoint Encryption Policy Server prior 6.0.0.4013 obsolete function (ZDI-25-371)
CVE-2025-50202 | Lychee up to 6.6.9 SecurePathController.php path traversal (GHSA-6rj9-gm78-vhf9)
CVE-2025-49824 | conda-forge conda-smithy up to 3.47.0 travis_encrypt_binstar_token information disclosure (GHSA-2xf4-hg9q-m58q)
CVE-2025-6107 | comfyanonymous comfyui 0.3.40 /comfy/utils.py set_attr dynamically-determined object attributes (EUVD-2025-18364)
Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication
特朗普第三次给予 TikTok 90 天宽限期
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict
35 open-source security tools to power your red team, SOC, and cloud security
This article showcases free, open-source security tools that support your organization’s teams in red teaming, threat hunting, incident response, vulnerability scanning, and cloud security. Autorize: Burp Suite extension for automatic authorization enforcement detection Autorize is an open-source Burp Suite extension that checks if users can access things they shouldn’t. It runs automatic tests to help security testers find authorization problems. BadDNS: Open-source tool checks for subdomain takeovers BadDNS is an open-source Python DNS auditing tool … More →
The post 35 open-source security tools to power your red team, SOC, and cloud security appeared first on Help Net Security.
伊朗计划全面断网
AI is changing cybersecurity roles, and entry-level jobs are at risk
Will humans remain essential in cybersecurity, or is AI set to take over? According to Wipro, many CISOs are leveraging AI to improve threat detection and response times and to build enhanced incident response capabilities. What’s changing AI systems can now perform a variety of tasks that were once handled by entry-level analysts, such as drafting reports, generating alerts, and assembling presentations for management. By taking over these repetitive jobs, AI gives human professionals more … More →
The post AI is changing cybersecurity roles, and entry-level jobs are at risk appeared first on Help Net Security.