Aggregator
Компьютеры — в осаде, сотрудники — без доступа. Air Serbia осталась без IT-инфраструктуры
JVN: ISC BINDにおける複数の脆弱性(2025年7月)
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
Machine unlearning gets a practical privacy upgrade
Machine learning models are everywhere now, from chatbots to credit scoring tools, and they carry traces of the data they were trained on. When someone asks to have their personal data erased under laws like the GDPR, their data also needs to be wiped from the machine learning models that learned from it. Retraining a model from scratch every time a deletion request comes in isn’t feasible in most production settings. Machine unlearning, which refers … More →
The post Machine unlearning gets a practical privacy upgrade appeared first on Help Net Security.
Майнер в сети, флуд на порту: как одна атака могла обрушить инфраструктуру «Ортикс»
FortiWeb Systems Compromised via Webshells After Public PoC Release
A widespread cyberattack campaign has successfully compromised dozens of Fortinet FortiWeb instances through webshell deployment, exploiting a critical vulnerability for which proof-of-concept code became publicly available just days ago. The rapid weaponization of the exploit demonstrates the immediate risks organizations face when security flaws become public knowledge. Critical Vulnerability Details and Impact The attacks center […]
The post FortiWeb Systems Compromised via Webshells After Public PoC Release appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft Honors Top Contributors to MSRC’s Security Research Program
Microsoft has announced its 2025 Most Valuable Researchers (MVRs), recognizing 100 security researchers who made significant contributions to protecting the company’s customers through the Microsoft Security Response Center’s vulnerability disclosure program. The annual recognition celebrates researchers who discovered and responsibly reported security vulnerabilities between July 1, 2024, and June 30, 2025. The Microsoft Researcher Recognition […]
The post Microsoft Honors Top Contributors to MSRC’s Security Research Program appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-20867 | Samsung Email up to 6.1.90.16 privileges management
CVE-2024-20868 | Samsung Notes 2.0.02.31/4.2.00.22/4.2.04.27/4.3.14.39 input validation
CVE-2025-20913 | Samsung Notes up to 4.4.21.62 Content Drawing out-of-bounds
CVE-2025-20914 | Samsung Notes up to 4.4.21.62 Hand Writing out-of-bounds
CVE-2025-20915 | Samsung Notes up to 4.4.21.62 Voice Content out-of-bounds
CVE-2024-5936 | imartinez privategpt up to 0.5.0 File redirect
CVE-2025-20898 | Samsung Members 2.4.25/3.9.10.11/4.2.005 input validation
CVE-2025-20900 | Samsung Blockchain Keystore 1.3.12.1/1.3.13.5/1.3.16 out-of-bounds write
CVE-2025-20901 | Samsung Blockchain Keystore 1.3.12.1/1.3.13.5/1.3.16 out-of-bounds
CVE-2025-20894 | Samsung Email up to 6.1.94.2 access control
Why silent authentication is the smarter way to secure BYOD
In this Help Net Security video, Andy Ulrich, CISO at Vonage, explains how silent authentication offers a smarter, seamless solution to the security and productivity challenges of BYOD. He breaks down how it works, why it matters, and how businesses can boost both user experience and compliance without compromising protection. Read more: Aegis Authenticator: Free, open-source 2FA app for Android Why should companies or organizations convert to FIDO security keys? Product showcase: Secure digital and … More →
The post Why silent authentication is the smarter way to secure BYOD appeared first on Help Net Security.
Learn the Next Thing, Not Everything
The pressure to grow doesn't come from curiosity alone. It comes from real friction in the systems you work with. That's why the smartest way to continue learning is not to try to master everything. Instead, focus on the next thing that will actually help you move forward in your role.