Aggregator
CVE-2025-52870 | QNAP Systems Qsync Central prior 5.0.0.4 buffer overflow (qsa-26-02)
CVE-2025-54146 | QNAP Systems Qsync Central prior 5.0.0.4 null pointer dereference (qsa-26-02)
CVE-2024-21762 | Fortinet FortiOS up to 7.4.2 SSL-VPN out-of-bounds write (FG-IR-24-015 / Nessus ID 236788)
重编程特定神经元能恢复小鼠记忆功能
Вредоносный код научился собираться «на лету» прямо в памяти. И ваш антивирус это даже не заметит
ИБ — это не только капюшоны: как найти свое место в безопасности и не выгореть за полгода
Vega Raises $120M Series B for AI-Native Security Operations
Vega raised $120 million led by Accel to expand its AI-native security operations platform. The funding will boost product development and global go-to-market efforts as enterprises seek faster threat detection, broader analytics and support for complex multi-cloud and on-premises environments.
CVE-2026-2276 | Wix Web Application SVG Image Parser cross site scripting
CVE-2025-15575 | SolaX Power Pocket WiFi 4.0 prior 3.022.03 Firmware Update code download
CVE-2025-15574 | SolaX Power Pocket WiFi 4.0 prior 3.022.03 Registration random values
CVE-2025-15573 | SolaX Power Pocket WiFi 4.0 MQTT certificate validation
人类的总能量消耗受到限制
Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds
ИИ попросили поработать реверсером. Получилось так себе (но прогресс всё равно пугает)
Best Enterprise SSO Providers for EdTech/Education SaaS in 2026
Discover the best enterprise SSO providers for EdTech and Education SaaS in 2026, comparing security, scalability, compliance, and integrations.
The post Best Enterprise SSO Providers for EdTech/Education SaaS in 2026 appeared first on Security Boulevard.
Child exploitation, grooming, and social media addiction claims put Meta on trial
Landmark trials now underway allege Meta failed to protect children from sexual exploitation, grooming, and addiction-driven design.
The post Child exploitation, grooming, and social media addiction claims put Meta on trial appeared first on Security Boulevard.
Алло, мы ищем таланты (и пароли). Хакеры устроили самый дорогой спектакль в Zoom
Google Warns of Hackers Leveraging Gemini AI for All Stages of Cyberattacks
Threat actors have begun leveraging Google’s Gemini API to dynamically generate C# code for multi-stage malware, evading traditional detection methods. The Google Threat Intelligence Group (GTIG) detailed this in its February 2026 AI Threat Tracker report, spotlighting the HONESTCUE framework first observed in September 2025. HONESTCUE operates as a downloader and launcher that queries Gemini’s […]
The post Google Warns of Hackers Leveraging Gemini AI for All Stages of Cyberattacks appeared first on Cyber Security News.