Aggregator
CVE-2024-5979 | h2oai h2o-3 up to 3.46.0 run_tool MojoConvertTool resource consumption
CVE-2024-5549 | stitionai devika origin validation
CVE-2024-6037 | gaizhenbiao ChuanhuChatGPT up to 20240410 access control
CVE-2024-6036 | gaizhenbiao ChuanhuChatGPT up to 20240410 /queue/join fn_index resource consumption
CVE-2025-5450 | Ivanti Connect Secure/Policy Secure Certificate Management client-side enforcement of server-side security (EUVD-2025-20514)
CVE-2025-43580 | Adobe Audition up to 24.6.3/25.2 access of memory location after end of buffer (apsb25-56 / Nessus ID 241579)
CVE-2025-47994 | Microsoft Office deserialization (Nessus ID 241553)
CVE-2025-23121 | Veeam Backup & Replication up to 12.3.1.1139 Backup Server code injection (kb4743 / EUVD-2025-18675)
CVE-2024-24683 | Apache Hop Engine up to 2.7.x PrepareExecutionPipelineServlet Page ID cross site scripting
CVE-2022-50200 | Linux Kernel up to 5.19.1 selinux put_entry out-of-bounds (Nessus ID 242100)
CVE-2022-50085 | Linux Kernel up to 5.19.1 lvconvert-raid.sh raid_resume allocation of resources (Nessus ID 242100)
Louis Vuitton says customers in Turkey, South Korea and UK impacted by data breaches
«Здравствуйте, я из поддержки Microsoft» — так и началась крупнейшая VoIP-афера года
What Comes After Detection Rules? Smarter Detection Strategies in ATT&CK
DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day
DShield honeypots have reported previously unheard-of log quantities in a startling increase in cyber reconnaissance activity, with some subnets producing over a million entries in a single day. This surge, observed across multiple honeypot instances including residential and archived setups, marks a departure from historical patterns where high-activity spikes were rare anomalies. Over the past […]
The post DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Code Execution Through Email: How I Used Claude to Hack Itself
You don’t always need a vulnerable app to pull off a successful exploit. Sometimes all it takes is a well-crafted email, an LLM agent, and a few “innocent” plugins. This is the story of how I used a Gmail message to trigger code execution through Claude Desktop, and how Claude itself (!) helped me plan..
The post Code Execution Through Email: How I Used Claude to Hack Itself appeared first on Security Boulevard.
NETSCOUT Adaptive Threat Analytics improves incident response
NETSCOUT announced Adaptive Threat Analytics, a new enhancement to its Omnis Cyber Intelligence Network Detection and Response (NDR) solution, designed to improve incident response and reduce risk. Adaptive Threat Analytics enables security teams to investigate, hunt, and respond to cyber threats more rapidly. Cybersecurity professionals face a challenge in the race against time to detect and respond appropriately to cyber threats before it is too late. Alert fatigue, increasing alert volume, fragmented visibility from siloed … More →
The post NETSCOUT Adaptive Threat Analytics improves incident response appeared first on Help Net Security.