Aggregator
Submit #780406: code-projects Simple Gym Management System 1.0 SQL Injection [Accepted]
网友买助眠药收到注销驾驶证短信,交警:系提醒,建议到场核实
Submit #780305: Chatwoot 4.11.2 Server-Side Request Forgery [Accepted]
CVE-2026-5204 | Tenda CH22 1.0.0.1 Parameter /goform/webtypelibrary formWebTypeLibrary webSiteId stack-based overflow
Google Drive now detects ransomware and helps restore affected files
To help organizations minimize the impact of malware attacks on personal computers, Google launched ransomware detection and file restoration in beta in September 2025. These features are now generally available. End user alert in Drive for desktop when ransomware is detected (Source: Google) “Compared to the beta version, we can now detect more types of ransomware encryption and do so faster. Our latest AI model detects 14× more infections, providing broader protection,” the company said … More →
The post Google Drive now detects ransomware and helps restore affected files appeared first on Help Net Security.
CVE-2026-5203 | CMS Made Simple up to 2.2.22 UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder path traversal
NCSC Urges Immediate Patching of F5 BIG-IP Bug
Submit #780209: Tenda CH22 V1.0.0.1 Stack-based Buffer Overflow [Accepted]
California Gets Serious About Regulation (Again)
California Gets Serious About Regulation (Again)
California’s privacy regime has evolved. As of January 1, 2026, the CCPA/CPRA now mandates risk assessments, automated decision-making (AI) oversight, and independent cybersecurity audits.
The post California Gets Serious About Regulation (Again) appeared first on Security Boulevard.
Submit #772855: CMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.php [Accepted]
Слишком много лайков вредит здоровью. Еще одна страна решила выгнать детей из соцсетей
结合代码分析:CVE-2026-28409 WeGIA 远程代码执行漏洞
This month in security with Tony Anscombe – March 2026 edition
中国多品牌电动两轮车计划下月涨价
One Tool to Rule the Clouds: Auditing AWS, Azure, and Alibaba with Cloudtoolkit
cloudtoolkit Interactive multi-cloud security assessment framework. Capability overview Providers Payload Supported Alibaba Cloud backdoor-user: Backdoored user can be
The post One Tool to Rule the Clouds: Auditing AWS, Azure, and Alibaba with Cloudtoolkit appeared first on Penetration Testing Tools.
Akira
You must login to view this content