Aggregator
Хакер, которого мы заслужили: 1200 студентов стали заложниками стиральной машины
Submit #643839: jeecgboot JeecgBoot latest broken function level authorisation [Accepted]
Submit #643391: jeecgboot latest broken function level authorization [Accepted]
Apple issues spyware warnings as CERT-FR confirms attacks
为什么说使用代理式AI就必须了解毒性工作流?
Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage
全球消费的鳗鱼 99% 属于濒危物种
安天移动近期威胁情报盘点(8月27日-9月12日 )
Sublime Security enhances threat protection with AI agent
Sublime Security released the Autonomous Detection Engineer (ADÉ), an end-to-end AI agent that turns attack telemetry into transparent and auditable protection that security teams can trust. Email attacks are advancing as adversaries weaponize generative AI to create highly targeted and rapidly shifting campaigns. Unlike traditional solutions which rely on vendor-initiated coverage updates, ADÉ analyzes new attack patterns to write, test, and validate new tailored coverage. It analyzes historical data at scale, iterates on detection strategies, … More →
The post Sublime Security enhances threat protection with AI agent appeared first on Help Net Security.
CVE-2025-26304 | libming 0.4.8 util/parser.c parseSWF_EXPORTASSETS memory leak (Issue 323 / EUVD-2025-4484)
CVE-2025-21593 | Juniper Networks Junos OS/Junos OS Evolved BGP UPDATE Packet resource control (JSA92861 / Nessus ID 264549)
CVE-2025-58143 | Xen Reference TSC Page race condition (EUVD-2025-28911 / Nessus ID 264553)
The Hidden Threat: How Sensitive Information Leakage Puts Your Business at Risk
You Don’t Know What You Don’t Know – And That’s the Problem Picture this: Your development team has built a robust e-commerce platform. Your security team has implemented comprehensive protection measures. Your compliance team has checked all the boxes. Yet somewhere in your application stack, full credit card numbers are quietly leaking through API responses, […]
The post The Hidden Threat: How Sensitive Information Leakage Puts Your Business at Risk appeared first on Blog.
The post The Hidden Threat: How Sensitive Information Leakage Puts Your Business at Risk appeared first on Security Boulevard.
eviltree: searching for user provided keywords/regex in files
EvilTree A standalone python3 remake of the classic “tree” command with the additional feature of searching for user-provided
The post eviltree: searching for user provided keywords/regex in files appeared first on Penetration Testing Tools.
Сентябрьский патч для Windows 11 тайно удаляет две программы. Вот почему
GitFive: OSINT tool to investigate GitHub profiles
GitFive GitFive is an OSINT tool to investigate GitHub profiles. Main features : Usernames / names history Usernames
The post GitFive: OSINT tool to investigate GitHub profiles appeared first on Penetration Testing Tools.
DDoS Attack Hits 1.5 Billion Packets Per Second, Fueled by IoT Devices
A European DDoS mitigation provider has been struck by an unprecedented attack, with traffic volumes peaking at 1.5
The post DDoS Attack Hits 1.5 Billion Packets Per Second, Fueled by IoT Devices appeared first on Penetration Testing Tools.
Your Car Is at Risk: New Flaw Grants Hackers Root Access to Apple CarPlay
Researchers at Oligo Security have uncovered a vulnerability in Apple CarPlay that enables remote code execution with root
The post Your Car Is at Risk: New Flaw Grants Hackers Root Access to Apple CarPlay appeared first on Penetration Testing Tools.