Aggregator
CVE-2025-4955 | WP-FeedStats tarteaucitron.io Plugin up to 1.9.4 on WordPress Query Parameter cross site scripting (EUVD-2025-18664)
MacOS пал: северокорейцы проникли туда, где Apple считала себя неуязвимой
测试 Firefox 120 到 Firefox 141 在 Linux 下的性能
Chrome Cookie Encryption Bypassed: “C4 Attack” Exploits Padding Oracle to Steal Cookies
Google has once again drawn the attention of cybersecurity experts following its implementation of a new user data protection mechanism in the Chrome browser—AppBound Cookie Encryption. Although the initiative reflects an ambitious stride toward...
The post Chrome Cookie Encryption Bypassed: “C4 Attack” Exploits Padding Oracle to Steal Cookies appeared first on Penetration Testing Tools.
GitPhish: Open-source GitHub device code flow security assessment tool
GitPhish is an open-source security research tool built to replicate GitHub’s device code authentication flow. It features three core operating modes: an authentication server, automated landing page deployment, and an administrative management interface. GitPhish can be accessed via a command-line interface or a web dashboard, offering comprehensive features such as logging, analytics, and token management. “We designed GitPhish explicitly for security teams looking to conduct assessments and build detection capabilities around Device Code Phishing in … More →
The post GitPhish: Open-source GitHub device code flow security assessment tool appeared first on Help Net Security.
StealthMACsec strengthens Ethernet network security
StealthCores launched StealthMACsec, a comprehensive IEEE 802.1AE compliant MACsec engine that brings advanced side-channel countermeasures to Ethernet network security. Building on the proven security foundation of StealthAES, StealthMACsec delivers line-rate processing up to 10 Gbps on FPGA and even faster on ASIC while maintaining the highest levels of protection against sophisticated attacks. As Ethernet networks become increasingly critical to defense, industrial, and embedded systems, the need for link-layer security has never been greater. StealthMACsec addresses … More →
The post StealthMACsec strengthens Ethernet network security appeared first on Help Net Security.
网络安全分析人员的生成式AI辅助指南
PDF, звонок, вирус: новый тип атак, от которых не спасает даже защитное ПО
任天堂有意锁定 Switch 2 的 USB-C 端口阻止第三方扩展坞
CVE-2025-2537 | ThickBox JavaScript Library Plugin up to 3.1 on WordPress cross site scripting
CVE-2025-2540 | prettyPhoto Library Plugin up to 3.1.6 cross site scripting
CVE-2024-5647 | Magnific Popups Library Plugin up to 1.1.0 cross site scripting (EUVD-2024-54725)
CVE-2025-5961 | Migration, Backup, Staging Plugin up to 0.9.116 on WordPress wpvivid_upload_import_files unrestricted upload
CVE-2025-2932 | JKDEVKIT Plugin up to 1.9.4 on WordPress font_upload_handler denial of service
Healthcare CISOs must secure more than what’s regulated
In this Help Net Security interview, Henry Jiang, CISO at Ensora Health, discusses what it really takes to make DevSecOps work in healthcare. He explains how balancing speed and security isn’t easy and why aligning with regulations is key. Jiang also shares tips on working with engineering teams and how automation helps in DevSecOps. In a heavily regulated industry like healthcare, what specific challenges do CISOs encounter when integrating security into DevOps workflows? In healthcare, … More →
The post Healthcare CISOs must secure more than what’s regulated appeared first on Help Net Security.