Aggregator
CVE-2025-2913 | HDF5 up to 1.14.6 src/H5FL.c H5FL__blk_gc_list H5FL_blk_head_t use after free (Issue 5376)
CVE-2025-2912 | HDF5 up to 1.14.6 src/H5Omessage.c H5O_msg_flush oh heap-based overflow (Issue 5370)
Hackers Exploit MailChimp Email Marketing Platform Using Phishing and Social Engineering Tactics
Cybercriminals are increasingly targeting MailChimp, a popular email marketing platform, through sophisticated phishing and social engineering attacks. Recent incidents reveal compromised accounts being used to exfiltrate subscriber lists, impersonate trusted brands, and launch secondary attacks. Attackers bypass multi-factor authentication (MFA) by stealing session cookies via infostealer malware like RedLine and Lumma, enabling unauthorized access without […]
The post Hackers Exploit MailChimp Email Marketing Platform Using Phishing and Social Engineering Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Qilin
Submit #520899: https://github.com/HDFGroup/hdf5 HDF5 v1.14.6 Heap-based Buffer Overflow [Accepted]
Submit #520880: https://github.com/HDFGroup/hdf5 HDF5 v1.14.6 Heap-based Buffer Overflow [Accepted]
Submit #520404: https://github.com/HDFGroup/hdf5 HDF5 v1.14.6 Use After Free [Accepted]
Submit #519966: https://github.com/HDFGroup/hdf5 hfd5 v1.14.6 Heap-based Buffer Overflow [Accepted]
AIs as Trusted Third Parties
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties:
Abstract: We often interact with untrusted parties. Prioritization of privacy can limit the effectiveness of these interactions, as achieving certain goals necessitates sharing private data. Traditionally, addressing this challenge has involved either seeking trusted intermediaries or constructing cryptographic protocols that restrict how much data is revealed, such as multi-party computations or zero-knowledge proofs. While significant advances have been made in scaling cryptographic approaches, they remain limited in terms of the size and complexity of applications they can be used for. In this paper, we argue that capable machine learning models can fulfill the role of a trusted third party, thus enabling secure computations for applications that were previously infeasible. In particular, we describe Trusted Capable Model Environments (TCMEs) as an alternative approach for scaling secure computation, where capable machine learning model(s) interact under input/output constraints, with explicit information flow control and explicit statelessness. This approach aims to achieve a balance between privacy and computational efficiency, enabling private inference where classical cryptographic solutions are currently infeasible. We describe a number of use cases that are enabled by TCME, and show that even some simple classic cryptographic problems can already be solved with TCME. Finally, we outline current limitations and discuss the path forward in implementing them...
The post AIs as Trusted Third Parties appeared first on Security Boulevard.
【安全圈】Synology 邮件服务器让远程攻击者篡改系统配置
【安全圈】针对近期 Chrome 零日漏洞的利用,Mozilla 向 Windows 用户发布紧急补丁
【安全圈】假冒《白雪公主》电影种子传播恶意软件感染设
【安全圈】美国电信巨头遭新型勒索软件攻击 超40万用户数据泄露
Best Practices for Cyber Risk Management: Why CISOs Must Lead with Real-time Data
The world of cybersecurity has undergone a dramatic transformation, moving beyond simple checklists and technical jargon. The focus has shifted from siloed governance, risk, and compliance (GRC) exercises to cyber risk management that aligns security with business priorities. This transition was a key topic in the recent webinar, The Next-Gen CISO’s Guide to Cyber ROI, where experts discussed how organizations must adopt a risk-first mindset rather than a compliance-driven approach.
The post Best Practices for Cyber Risk Management: Why CISOs Must Lead with Real-time Data appeared first on Security Boulevard.
Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857)
Google’s fixing of CVE-2025-2783, a Chrome zero-day vulnerability exploited by state-sponsored attackers, has spurred Firefox developers to check whether the browser might have a similar flaw – and they found it. There’s currently no indication that the Firefox bug (CVE-2025-2857) is under active exploitation, but this should not be surprising: according to Statcounter, Chrome is used by 66.3% of internet users worldwide and Firefox only by 2.62%. About CVE-2025-2857 CVE-2025-2783 has been described as “a … More →
The post Critical Firefox, Tor Browser sandbox escape flaw fixed (CVE-2025-2857) appeared first on Help Net Security.
GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries
A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool. The flaw, if exploited, enables remote, unauthenticated attackers to manipulate database queries, potentially leading to severe consequences such as data theft, tampering, or even remote code execution. CVE-2025-24799 is an SQL injection vulnerability that specifically […]
The post GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.