Aggregator
Your supply chain security strategy might be missing the biggest risk
Third-party involvement in data breaches has doubled this year from 15 percent to nearly 30 percent. In response, many organizations have sharpened their focus on third-party risk management, carefully vetting the security practices of their vendors. However, a critical gap remains that many organizations overlook: fourth-party risk. The silent threat of fourth-party vendors Most organizations focus only on the vendors directly in their orbit, while neglecting to dig one step deeper into who those vendors … More →
The post Your supply chain security strategy might be missing the biggest risk appeared first on Help Net Security.
“From Zero to Hero: How I Landed My First Bug Bounty (And How You Can Too!)”
Cache Me Outside: How I Poisoned CDN Caches and Hijacked Sessions Like a Magician
赛道二比赛目标发布!模型应用线上环境漏洞赏金赛邀你来挑战
У вас Windows? Gunra уже шифрует всё в C:/Users — и вы даже не заметите
CVE-2025-8267 | ssrfcheck up to 1.1.x server-side request forgery (SNYK-JS-SSRFCHECK-9510756 / EUVD-2025-22851)
CVE-2023-53161 | sequoia-pgp buffered-reader Crate up to 1.0.1/1.1.4 on Rust out-of-bounds (GHSA-29mf-62xx-28jq)
CVE-2023-53160 | sequoia-pgp sequoia Crate up to 1.1.0/1.8.0/1.15.x on Rust out-of-bounds (GHSA-25mx-8f3v-8wh7)
CVE-2024-58265 | mcginty snow Crate up to 0.9.4 on Rust external control of critical state data (GHSA-7g9j-g5jg-3vv3)
CVE-2024-58266 | comex shlex Crate up to 1.2.0 on Rust escape output (GHSA-r7qv-8r2h-pg27)
CVE-2023-53157 | rosenpass Crate up to 0.2.0 on Rust UDP Packet length parameter (GHSA-6ggr-cwv4-g7qg)
CVE-2023-53159 | sfackler openssl Crate up to 0.10.54 on Rust set_host buffer over-read (ID 1965)
CVE-2023-53158 | GitoxideLabs gix-transport Crate up to 0.36.0 on Rust Username os command injection (GHSA-rrjw-j4m2-mf34)
知名保险公司安联人寿泄露140万客户详细信息 疑似员工被钓鱼泄露CRM权限
The legal minefield of hacking back
In this Help Net Security interview, Gonçalo Magalhães, Head of Security at Immunefi, discusses the legal and ethical implications of hacking back in cross-border cyber incidents. He warns that offensive cyber actions risk violating international law, escalating conflicts, and harming innocent third parties. Instead, Magalhães advocates for legally sanctioned frameworks, such as bug bounty programs, to strengthen security without crossing dangerous lines. How do international laws complicate the use of hacking back, especially in cross-border … More →
The post The legal minefield of hacking back appeared first on Help Net Security.