Aggregator
CVE-2022-50378 | Linux Kernel up to 5.15.74/5.19.16/6.0.2 __list_del_entry_valid use after free (Nessus ID 265547 / WID-SEC-2025-2092)
CVE-2022-50380 | Linux Kernel up to 5.15.75 mm /proc/pid/smaps_rollup null pointer dereference (EUVD-2025-29987 / Nessus ID 265601)
Rethinking Security as Access Control Moves to the Edge
The convergence of physical and digital security is driving a shift toward software-driven, open-architecture edge computing. Access control has typically been treated as a physical domain problem — managing who can open which doors, using specialized systems largely isolated from broader enterprise IT. However, the boundary between physical and digital security is increasingly blurring. With..
The post Rethinking Security as Access Control Moves to the Edge appeared first on Security Boulevard.
Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority
OT oversight is an expensive industrial paradox. It’s hard to believe that an area can be simultaneously underappreciated, underfunded, and under increasing attack. And yet, with ransomware hackers knowing that downtime equals disaster and companies not monitoring in kind, this is an open and glaring hole across many ecosystems. Even a glance at the numbers..
The post Hacks Up, Budgets Down: OT Oversight Must Be An IT Priority appeared first on Security Boulevard.
Backbase CISO: Defending Banking Apps at Runtime
There’s a major problem in application security: Organizations secure code before release, but attackers strike in production. This gap is exactly where runtime application security comes in.
The post Backbase CISO: Defending Banking Apps at Runtime appeared first on Security Boulevard.
CVE-2025-67506 | pipeshub-ai PipesHub prior 0.1.0-beta Endpoint convert path traversal (GHSA-w398-9m55-2357 / CNNVD-202512-2024)
CVE-2025-67648 | Shopware up to 6.7.5.1 Request Parameter AuthController.php cross site scripting (GHSA-6w82-v552-wjw2 / CNNVD-202512-2027)
CVE-2025-67644 | langchain-ai langgraph up to 3.0.0 CheckpointSaver _metadata_predicate sql injection (GHSA-9rwj-6rc7-p77c / CNNVD-202512-2029)
CVE-2025-67511 | aliasrobotics cai up to 0.5.9 run_ssh_command_with_credentials port command injection (GHSA-4c65-9gqf-4w8h / CNNVD-202512-2030)
CVE-2025-67646 | Telepedia TableProgressTracking up to 1.2.0 REST API cross-site request forgery (GHSA-j24f-hw6w-cq78 / CNNVD-202512-2028)
Identity Management in the Fragmented Digital Ecosystem: Challenges and Frameworks
Modern internet users navigate an increasingly fragmented digital ecosystem dominated by countless applications, services, brands and platforms. Engaging with online offerings often requires selecting and remembering passwords or taking other steps to verify and protect one’s identity. However, following best practices has become incredibly challenging due to various factors. Identifying Digital Identity Management Problems in..
The post Identity Management in the Fragmented Digital Ecosystem: Challenges and Frameworks appeared first on Security Boulevard.