Aggregator
UK ICO finds students behind majority of school data breaches
UK ICO finds students behind majority of school data breaches
CNCERT在国家网络安全宣传周活动全预告
INC ransom group claimed the breach of Panama’s Ministry of Economy and Finance
INC ransom group claimed the breach of Panama’s Ministry of Economy and Finance
14 октября — день X для пользователей Windows. Microsoft ставит крест на популярной ОС
What could a secure 6G network look like?
The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised and make sure to build it with a secure-by-design approach. Telecom industry leaders need to anticipate novel vulnerabilities and attacks specific for 6G. Unlike the previous generation of wireless, 6G will expand to even more … More →
The post What could a secure 6G network look like? appeared first on Help Net Security.
CVE-2025-4234 | Palo Alto Cortex XDR Microsoft 365 Defender Pack up to 11.0.2-132 Application Log log file (EUVD-2025-29070 / WID-SEC-2025-2035)
史上最强?揭秘11.5T级超大规模僵尸网络AISURU的内幕
AMD 的 RDNA4 GPU 架构
CVE-2007-4244 | J Reactions up to 1.8.1 on Joomla langset.php comPath code injection (EDB-30452 / XFDB-35808)
CVE-2007-5733 | Japanese PHP Gallery Hosting File Upload upload/upload.php ServerPath code injection (EDB-30703 / BID-26179)
CVE-2007-4115 | IT!CMS lang-en.php wndtitle cross site scripting (EDB-30433 / XFDB-35663)
CVE-2007-4115 | IT!CMS titletext-ed.php wndtitle cross site scripting (EDB-30433 / XFDB-35663)
CVE-2007-4115 | IT!CMS menu-ed.php wndtitle cross site scripting (EDB-30433 / XFDB-35663)
Реальность — подделка: мозг давно сам дорисовывает всё, что ты видишь и слышишь
Why neglected assets are the hidden threat attackers love to find
In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned storage, these hidden vulnerabilities quietly expand the attack surface. Chase explains how attackers exploit these blind spots, highlights recent guidance from CISA, and offers practical steps for organizations to improve visibility, lifecycle management, and governance to prevent breaches.
The post Why neglected assets are the hidden threat attackers love to find appeared first on Help Net Security.