Aggregator
CVE-2025-54146 | QNAP Systems Qsync Central prior 5.0.0.4 null pointer dereference (qsa-26-02)
CVE-2024-21762 | Fortinet FortiOS up to 7.4.2 SSL-VPN out-of-bounds write (FG-IR-24-015 / Nessus ID 236788)
重编程特定神经元能恢复小鼠记忆功能
Вредоносный код научился собираться «на лету» прямо в памяти. И ваш антивирус это даже не заметит
ИБ — это не только капюшоны: как найти свое место в безопасности и не выгореть за полгода
Vega Raises $120M Series B for AI-Native Security Operations
Vega raised $120 million led by Accel to expand its AI-native security operations platform. The funding will boost product development and global go-to-market efforts as enterprises seek faster threat detection, broader analytics and support for complex multi-cloud and on-premises environments.
CVE-2026-2276 | Wix Web Application SVG Image Parser cross site scripting
CVE-2025-15575 | SolaX Power Pocket WiFi 4.0 prior 3.022.03 Firmware Update code download
CVE-2025-15574 | SolaX Power Pocket WiFi 4.0 prior 3.022.03 Registration random values
CVE-2025-15573 | SolaX Power Pocket WiFi 4.0 MQTT certificate validation
人类的总能量消耗受到限制
Nation-State Hackers Embrace Gemini AI for Malicious Campaigns, Google Finds
ИИ попросили поработать реверсером. Получилось так себе (но прогресс всё равно пугает)
Best Enterprise SSO Providers for EdTech/Education SaaS in 2026
Discover the best enterprise SSO providers for EdTech and Education SaaS in 2026, comparing security, scalability, compliance, and integrations.
The post Best Enterprise SSO Providers for EdTech/Education SaaS in 2026 appeared first on Security Boulevard.
Child exploitation, grooming, and social media addiction claims put Meta on trial
Landmark trials now underway allege Meta failed to protect children from sexual exploitation, grooming, and addiction-driven design.
The post Child exploitation, grooming, and social media addiction claims put Meta on trial appeared first on Security Boulevard.
Алло, мы ищем таланты (и пароли). Хакеры устроили самый дорогой спектакль в Zoom
Google Warns of Hackers Leveraging Gemini AI for All Stages of Cyberattacks
Threat actors have begun leveraging Google’s Gemini API to dynamically generate C# code for multi-stage malware, evading traditional detection methods. The Google Threat Intelligence Group (GTIG) detailed this in its February 2026 AI Threat Tracker report, spotlighting the HONESTCUE framework first observed in September 2025. HONESTCUE operates as a downloader and launcher that queries Gemini’s […]
The post Google Warns of Hackers Leveraging Gemini AI for All Stages of Cyberattacks appeared first on Cyber Security News.
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2024-43468 Microsoft Configuration Manager SQL Injection Vulnerability
- CVE-2025-15556 Notepad++ Download of Code Without Integrity Check Vulnerability
- CVE-2025-40536 SolarWinds Web Help Desk Security Control Bypass Vulnerability
- CVE-2026-20700 Apple Multiple Buffer Overflow Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.