Aggregator
CVE-2026-4829 | Devolutions Server up to 2026.1.11 OAuth improper authentication (DEVO-2026-0010)
CVE-2025-67806 | Sage DPW 2021_06_004 response discrepancy
CVE-2025-67805 | Sage DPW 2025_06_004 Database Monitor Feature improper authentication
Key Leaks, Vault Failures, and TEE Attacks: Highlights from RWC 2026
What resonated most at RWC 2026? GitGuardian highlights key research on private key leaks, password managers, trusted execution environments, and secret sprawl.
The post Key Leaks, Vault Failures, and TEE Attacks: Highlights from RWC 2026 appeared first on Security Boulevard.
CVE-2025-13535 | kingaddons King Addons for Elementor Plugin up to 51.1.53 on WordPress Elementor Widget esc_attr/esc_url cross site scripting (EUVD-2025-209162)
CVE-2026-4925 | Devolutions Server up to 2026.1.11 Users MFA Feature authorization (DEVO-2026-0010)
CVE-2026-4924 | Devolutions Server up to 2026.1.11 2FA weak authentication (DEVO-2026-0010)
CVE-2026-4828 | Devolutions Server up to 2026.1.11 OAuth Login weak authentication (DEVO-2026-0010)
CVE-2026-30291 | Ora Tools PDF Reader App 4.3.5 access control (ID 18 / EUVD-2026-17891)
CVE-2026-30523 | SourceCodester Loan Management System 1.0 Loan Plans months logic error (EUVD-2026-17897)
百度多辆无人驾驶出租车同时发生故障
CVE-2026-30573 | SourceCodester Pharmacy Product Management System 1.0 add-sales.php txtprice/txttotalcost behavioral workflow (EUVD-2026-17901)
5 AWS AI Controls Every Security Team Should Have
Most teams govern AI workloads at the application layer. They configure guardrails for their Bedrock agents, scope IAM roles per workload, and build policies around approved models. That discipline matters, but it breaks down the moment a developer spins up a new account or invokes a model directly without touching the application stack. Org-level enforcement […]
The post 5 AWS AI Controls Every Security Team Should Have appeared first on Security Boulevard.
Red Canary CFP tracker: April 2026
CVE-2026-30877 | baserproject basercms up to 5.2.2 User Account update os command injection (GHSA-m9g7-rgfc-jcm7 / CNNVD-202603-6291)
CVE-2025-32957 | baserproject basercms up to 5.2.2 require_once unrestricted upload (GHSA-hv78-cwp4-8r7r / CNNVD-202603-6293)
CVE-2026-21861 | baserproject basercms up to 5.2.2 exec os command injection (GHSA-qxmc-6f24-g86g / CNNVD-202603-6295)
CVE-2026-27697 | baserproject basercms up to 5.2.2 Blog Post sql injection (GHSA-vh89-rjph-2g7p / CNNVD-202603-6292)
48 Hours: The Window Between Infostealer Infection and Dark Web Sale
New research maps the full infostealer lifecycle. Your credentials go from an employee’s device to an underground marketplace in less time than it takes your security team to notice anything is wrong. On March 24, 2026, researchers at Whiteintel’s Intelligence Division published a detailed map of the full infostealer lifecycle, tracing the exact sequence from […]
The post 48 Hours: The Window Between Infostealer Infection and Dark Web Sale appeared first on Security Boulevard.