Aggregator
Adversarial Robustness Toolbox: crafting and analysis of attacks and defense methods for machine learning models
Adversarial Robustness Toolbox Adversarial Robustness 360 Toolbox (ART) is a Python library supporting developers and researchers in defending Machine Learning models (Deep Neural Networks, Gradient Boosted Decision Trees, Support Vector Machines, Random Forests, Logistic...
The post Adversarial Robustness Toolbox: crafting and analysis of attacks and defense methods for machine learning models appeared first on Penetration Testing Tools.
MemProcFS: The Memory Process File System
The Memory Process File System: The Memory Process File System (MemProcFS) is an easy and convenient way of accessing physical memory as files a virtual file system. Easy trivial point-and-click memory analysis without the...
The post MemProcFS: The Memory Process File System appeared first on Penetration Testing Tools.
CVE-2022-35640 | IBM Sterling Partner Engagement Manager 6.2.2 information exposure (XFDB-230933)
CVE-2023-42010 | IBM Sterling B2B Integrator Standard Edition up to 6.1.2.5/6.2.0.2 HTTP Response exposure of sensitive system information to an unauthorized control sphere (XFDB-265507)
CVE-2023-50304 | IBM Engineering Requirements Management DOORS 9.7.2.8 xml external entity reference (XFDB-273335)
CVE-2024-40689 | IBM InfoSphere Information Server 11.7 sql injection (XFDB-297719)
CVE-2024-45330 | Fortinet FortiAnalyzer up to 7.2.5/7.4.3 Requests format string (FG-IR-24-196)
CVE-2024-43789 | Discourse up to 3.3.0/3.4.0.beta0 Reply resource consumption (GHSA-62cq-cpmc-hvqq)
CVE-2024-45051 | Discourse up to 3.3.1/3.4.0.beta1 Email improper authentication (GHSA-2vjv-pgh4-6rmq)
CVE-2024-45297 | Discourse up to 3.3.1/3.4.0.beta1 Topic label/name privileges management (GHSA-58xw-3qr3-53gp)
每日安全动态推送(10-18)
CVE-2011-4153 | PHP 5.3.8 zend_builtin_functions.c define input validation (RHSA-2012:0546 / EDB-18370)
网安培训|珂兰寺开班倒计时
应对勒索,我们真的准备好了吗?
Hacker Poses as Israeli Security Vendor to Deliver Wiper
Cybercriminals posing as a top security firm in Israel have launched wiper attacks on local cybersecurity professionals after bypassing significant security measures, according to recent reports. Cybersecurity firm Eset said threat actors did not compromise its systems.
CVE-2016-7000 | Adobe Acrobat Reader up to 11.0.17/15.006.30201/15.017.20053 memory corruption (APSB16-33 / Nessus ID 94074)
AI驱动机器人暴关键漏洞,可致机器人失控执行危险行为
Ransomware borrows industry tools to target corporate EDR
Ransomware’s history is littered with threat actors that rise and fall but every now and then a new name appears that grabs people’s attention for the wrong reasons. RansomHub, a ransomware-as-a-service (RaaS) platform which seems to have successfully recruited affiliates from the downed BlackCat and Lockbit groups during 2024, is the latest example of this […]
The post Ransomware borrows industry tools to target corporate EDR appeared first on Ransomware.org.