Aggregator
Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
The Enterprise Risk of OAuth Device Flow Vulnerabilities – And How SSOJet Solves It
5 Key Reasons Why Enterprise Readiness is Essential in Physical Security
CVE-2025-54411 | Discourse up to 3.5.0.beta7 cross site scripting
CVE-2025-53763 | Microsoft Purview Data Governance Azure Databricks access control (EUVD-2025-25589)
CVE-2024-50645 | MallChat 1.0-SNAPSHOT API improper authentication (Issue 179)
CVE-2025-55229 | Microsoft Windows up to Server 2025 Windows Certificates signature verification (EUVD-2025-25495 / WID-SEC-2025-1891)
CVE-2025-53795 | Microsoft PC Manager improper authorization (EUVD-2025-25500)
CVE-2025-55230 | Microsoft Windows up to Server 2025 MBT Transport Driver untrusted pointer dereference (EUVD-2025-25496 / WID-SEC-2025-1891)
Sintesi dell'AI Act
玄武阿图因(Atuin)自动化漏洞挖掘引擎发现零知识证明库 gnark 的签名可锻造性漏洞
Author: Guancheng Li, Xiaolin Zhang of Tencent Xuanwu Lab
近日,玄武实验室自主研发的阿图因(Atuin)自动化漏洞挖掘引擎,在零知识证明库 gnark 的 EdDSA 与 ECDSA 签名验证功能中发现一处高危漏洞(CVE-2025-57801,CVSS Score 8.6),该漏洞允许攻击者在不获取私钥的前提下针对同一条消息构造新的有效签名并通过验证。漏洞的验证工作由玄武实验室联合上海交通大学 GOSSIP 实验室与郁昱教授团队共同完成。值得注意的是,尽管 gnark 在其官方 README 中宣称已接受完整审计,阿图因引擎仍成功识别出这一漏洞,展现出人类专家级的自动化漏洞挖掘能力。
Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services From 30,000+ IPs
A massive coordinated scanning campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with threat actors deploying over 30,000 unique IP addresses to probe for vulnerabilities in Microsoft RD Web Access and RDP Web Client authentication portals. The campaign represents one of the largest coordinated RDP reconnaissance operations observed in recent years, signaling potential preparation for […]
The post Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services From 30,000+ IPs appeared first on Cyber Security News.
Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO
Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in smart fleets to defending against advanced persistent threats, protecting the agricultural supply chain requires a layered, collaborative approach. In this Help Net Security interview, Carl Kubalsky, Director and Deputy CISO at John Deere discusses the most pressing security challenges in agriculture, how his team is working with partners and ethical hackers to stay ahead of … More →
The post Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO appeared first on Help Net Security.