Aggregator
CVE-2026-25806 | Praskla-Technology assessment-placipy 1.0.0 student.routes.ts authorization (GHSA-99gr-8933-3vwj)
CVE-2026-25810 | Praskla-Technology assessment-placipy 1.0.0 student.submission.routes.ts authorization (GHSA-2gqv-gxrj-p8x3)
CVE-2026-25876 | Praskla-Technology assessment-placipy 1.0.0 results.routes.ts authorization (GHSA-w238-w4mg-j357)
CVE-2026-25809 | Praskla-Technology assessment-placipy 1.0.0 Code Evaluation Endpoint improper authorization (GHSA-cc32-rp29-w9x7)
CVE-2026-2173 | code-projects Online Examination System 1.0 login.php username/password sql injection (EUVD-2026-5777)
CVE-2026-2174 | code-projects Contact Management System 1.0 CRUD Endpoint ID improper authentication (EUVD-2026-5776)
CVE-2026-2176 | code-projects Contact Management System 1.0 index.py selecteditem[0] sql injection (EUVD-2026-5774)
«Жалкие три девятки». GitHub не справляется даже с базовым стандартом надежности — а статистику сбоев теперь пытаются скрыть
【已复现】Microsoft Windows 记事本远程代码执行漏洞(CVE-2026-20841)安全风险通告
83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
Palo Alto Networks Firewall Vulnerability Allows an Attacker to Force Firewalls into a Reboot Loop
A critical denial-of-service (DoS) flaw in Palo Alto Networks’ PAN-OS software could let unauthenticated attackers crash firewalls into endless reboot cycles, potentially crippling enterprise networks. Dubbed CVE-2026-0229, the vulnerability lurks in the Advanced DNS Security (ADNS) feature. An attacker sends a maliciously crafted packet to trigger a system reboot. Repeated exploitation forces the firewall into […]
The post Palo Alto Networks Firewall Vulnerability Allows an Attacker to Force Firewalls into a Reboot Loop appeared first on Cyber Security News.
Сначала — симуляция, потом — блэкаут. Утечка документов раскрыла, как Китай тренирует кибератаки на соседей
When security decisions come too late, and attackers know it
In this Help Net Security, Chris O’Ferrell, CEO at CodeHunter, talks about why malware keeps succeeding, where attackers insert malicious code in the SDLC, and how CI/CD pipelines can become a quiet entry point. He also breaks down the difference between behavioral detection and behavioral intent analysis, and why explainable results matter for security teams. What is the most common reason modern malware succeeds even in organizations with mature EDR and threat intel programs? Modern … More →
The post When security decisions come too late, and attackers know it appeared first on Help Net Security.
Google says hackers are abusing Gemini AI for all attacks stages
JVN: ZLAN製ZLAN5143Dにおける複数の重要な機能に対する認証の欠如の脆弱性
JVN: 複数のAVEVA製品における複数の脆弱性
Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools to Deploy Ransomware Attacks
Cybercriminals are increasingly using valid administrative software to launch attacks, making their malicious activities much harder to spot. Instead of relying solely on custom computer viruses, these actors abuse legitimate workforce monitoring tools to hide inside business networks. By utilizing software designed for tracking employee productivity, they can control systems and steal sensitive data without […]
The post Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools to Deploy Ransomware Attacks appeared first on Cyber Security News.
俄罗斯屏蔽 WhatsApp
OpenClaw Scanner: Open-source tool detects autonomous AI agents
A new free, open source tool is available to help organizations detect where autonomous AI agents are operating across corporate environments. The OpenClaw Scanner identifies instances of OpenClaw, an autonomous AI assistant also known as MoltBot, that can execute tasks, access local files, and authenticate to internal systems without centralized oversight. OpenClaw gained usage in the past few months as an AI agent capable of performing actions on behalf of users. The software can run … More →
The post OpenClaw Scanner: Open-source tool detects autonomous AI agents appeared first on Help Net Security.