Aggregator
45 мировых лидеров — и одна диверсия, которая остановила страну. Саммит НАТО теперь опасен для жизни?
BackBox 8.0 empowers organizations to strengthen their cyber resilience strategy
BackBox announced the upcoming release of BackBox 8.0, a significant advancement engineered to address the complex and often disparate challenge of securing modern networks that blend traditional on-premise hardware with burgeoning cloud-managed and SASE (Secure Access Service Edge) environments. This new release provides organizations a unified, enhanced view and control, strengthening their cyber resilience posture across these hybridized infrastructures. The release of BackBox 8.0 addresses the two major trends seen in today’s enterprise networks: the … More →
The post BackBox 8.0 empowers organizations to strengthen their cyber resilience strategy appeared first on Help Net Security.
NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code
NVIDIA has issued an urgent security update for its open-source Megatron-LM framework, following the discovery of two critical vulnerabilities that could allow attackers to inject and execute malicious code on affected systems. The flaws, tracked as CVE-2025-23264 and CVE-2025-23265, impact all platforms running Megatron-LM versions prior to 0.12.0 and have prompted a swift response from […]
The post NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2010-1043 | jaxCMS 1.0 index.php path traversal (EDB-11359 / SA38524)
The tiny amplifier that could supercharge quantum computing
Quantum computers are built to handle problems that are far too complex for today’s machines. They could lead to major advances in areas like drug development, encryption, AI, and logistics. Photo by Chalmers University of Technology Now, researchers at Chalmers University of Technology in Sweden have developed a new type of amplifier that only switches on when it’s reading data from qubits. Because of its smart design, it uses just one-tenth the power of the … More →
The post The tiny amplifier that could supercharge quantum computing appeared first on Help Net Security.
Abstract Security unveils cloud-native cold storage for security telemetry
Abstract Security announced LakeVilla, a cloud-native cold storage solution built for long-term security telemetry retention that delivers compliance-ready, highly accessible storage at a fraction of SIEM costs—without compromising on performance or accessibility. “Security telemetry is exploding—but that doesn’t mean you should have to choose between storing it affordably and actually being able to access it when it matters,” said Colby DeRodeff, CEO of Abstract Security. “We designed LakeVilla so you never have to compromise again. … More →
The post Abstract Security unveils cloud-native cold storage for security telemetry appeared first on Help Net Security.
CVE-2025-52471 | espressif esp-idf 5.1.6/5.2.5/5.3.3/5.4.1 ESP-NOW Protocol esp_now_register_recv_cb data_len integer underflow (GHSA-hqhh-cp47-fv5g / EUVD-2025-19059)
CVE-2025-52884 | risc0 risc0-ethereum up to 2.1.0 Steel.validateCommitment invalid special elements (GHSA-gjv3-89hh-9xq2 / EUVD-2025-19064)
CVE-2025-52883 | Meshtastic up to 2.5.20 on Android Direct Message improper validation of specified type of input (GHSA-h4rg-g6f3-ghh7 / EUVD-2025-19065)
JVN: Kaleris製Navis N4における複数の脆弱性
JVN: Delta Electronics製CNCSoftにおける複数の境界外書き込みの脆弱性
JVN: Parsons製AccuWeather and Custom RSS widgetにおけるクロスサイトスクリプティングの脆弱性
「新威胁频出,实战者集结!」CSOP 2025网络安全运营实战大会8月北京启幕
当AI驱动的攻击武器在黑市流通,当地缘政治风云变幻APT组织活动猖獗,当“银狐”对一家单位的拉群攻击影响范围超过万人,当每一次漏洞曝光都可能引发连锁灾难——网络安全的下一个战场在哪里?
中国网络安全界的“硬核盛会”CSOP网络安全运营实战大会以“新态势 新实战”为主题,这里没有纸上谈兵,只有真实攻防、血泪经验与生存法则。我们向所有奋战在一线的安全工程师、攻防团队和企业决策者发出邀请:这一次,让我们拆解威胁,赢在实战。
本次大会将于8月21日在北京率先启幕,并将于8月28日、9月5日分别在上海和深圳两地精彩延续。届时,来自平安银行、东吴证券、财付通、京东方、vivo、清华大学、康宝莱等单位的多位安全负责人,将与安全运营领域的权威专家、行业用户共聚,在新态势与新实战的攻防博弈中,共探面向实战化的安全建设和运营之道。
「新威胁频出,实战者集结!」CSOP 2025网络安全运营实战大会8月北京启幕
《我的世界》玩家遭Stargazers恶意软件攻击 黑客利用建模生态与GitHub窃取凭证
Why the SOC needs its “Moneyball” moment
In the classic book and later Brad Pitt movie Moneyball, the Oakland A’s didn’t beat baseball’s giants by spending more – they won by thinking differently, scouting players not through gut instinct and received wisdom, but by utilizing relevant data and pattern recognition. While the rest of the league fixated on batting averages, they focused on what really mattered: getting on base. Security operations centers (SOCs) are at the same crossroads, and only those who … More →
The post Why the SOC needs its “Moneyball” moment appeared first on Help Net Security.
Один API — и ваш Docker работает на чужой карман. Анонимно и безнаказанно
Feds Warn Healthcare Sector of Rising Iranian Cyberthreats
Government authorities are warning of increased risk of Iranian cyber and related threats against healthcare and public health sector organizations - including ransomware, distributed denial-of-service and other attacks related to that nation's escalated conflicts with Israel and the U.S.
Key Cyber Law's Lapse Could Mute Threat Sharing Nationwide
With the Cybersecurity Information Sharing Act of 2015 set to expire this fall, lawmakers face mounting pressure to update its liability protections and outdated definitions, as experts warn that failure to modernize could undermine public-private threat sharing and weaken national cyber defenses.