Aggregator
Воркшоп: Управление метриками информационной безопасности. Ваша система работает эффективно?
CVE-2009-4598 | Corephp Com Jphoto 1.0 index.php ID sql injection (EDB-10367 / XFDB-54664)
安全动态回顾|FIN6黑客冒充求职者通过后门进入招聘人员的设备中 微软365 Copilot中发现零点击AI数据泄露漏洞
新型Secure Boot漏洞允许攻击者安装引导工具包恶意软件
Why banks’ tech-first approach leaves governance gaps
In this Help Net Security interview, Rich Friedberg, CISO at Live Oak Bank, discusses how banks can better align cybersecurity efforts with broader cyber governance and risk priorities. Banking institutions often falter when cybersecurity is siloed as purely a technical or compliance issue. Cyber governance requires treating cybersecurity as a strategic business risk embedded across enterprise-wide decision-making. Where do banks typically struggle when trying to align cybersecurity efforts with broader governance and risk priorities? Banks … More →
The post Why banks’ tech-first approach leaves governance gaps appeared first on Help Net Security.
CVE-2018-6368 | JomEstate PRO up to 3.7 on Joomla ID sql injection (EDB-44117)
CVE-2025-5964 | M-Files Server up to 25.3.14549 API Endpoint path traversal (EUVD-2025-18348)
Хакеры вскрыли то, что должно было остаться под землёй. И это уже не шутки
MDEAutomator: Open-source endpoint management, incident response in MDE
Managing endpoints and responding to security incidents in Microsoft Defender for Endpoint (MDE) can be time-consuming and complex. MDEAutomator is an open-source tool designed to make that easier. MDEAutomator is a modular, serverless solution for IT and security teams looking to save time and reduce manual work. By using Azure Function Apps and a custom PowerShell module, MDEAutomator automates tasks like deploying MDE to new devices and responding to alerts, without needing to manage extra … More →
The post MDEAutomator: Open-source endpoint management, incident response in MDE appeared first on Help Net Security.
CVE-2025-5964 | M-Files Server up to 25.3.14549 API Endpoint path traversal (EUVD-2025-18348)
Он не программист, не пентестер и даже не человек — но нашёл 0day в библиотеке Windows
CVE-2007-6266 | bcoos 1.0.10 lid sql injection (EDB-30824 / XFDB-36752)
Virtual kidnapping scams prey on our worst fears
Getting a call saying a family member has been kidnapped is terrifying. Fear and panic take over, making it hard to think clearly. That’s exactly what criminals count on when they use a scam called virtual kidnapping. What is virtual kidnapping? It’s emotional extortion where scammers claim a loved one has been abducted and demand ransom. Using AI-generated voices, social media details, and spoofed caller IDs, they make threats seem real and pressure victims to … More →
The post Virtual kidnapping scams prey on our worst fears appeared first on Help Net Security.
CVE-2013-0946 | EMC AlphaStor 4.0 memory corruption (EDB-42719 / XFDB-84130)
Пока США судит Google — Мексика отпускает. Где логика в мировой антимонопольной игре
CVE-2005-0890 | Dream4 Koobi CMS 4.2.3 Index.PHP area sql injection (EDB-25273 / BID-12896)
Review: Learning Kali Linux, 2nd Edition
Kali Linux has long been the go-to operating system for penetration testers and security professionals, and Learning Kali Linux, 2nd Edition by Ric Messier aims to guide readers through its core tools and use cases. This updated edition introduces new material on digital forensics and reverse engineering, while keeping its focus on practical, hands-on learning. It’s written for people who have at least some familiarity with Linux or command-line environments, but it doesn’t assume deep … More →
The post Review: Learning Kali Linux, 2nd Edition appeared first on Help Net Security.