Aggregator
CVE-2024-52874 | Infoblox NETMRI up to 7.6.0 sql injection
CVE-2025-48369 | Intermesh groupoffice up to 6.8.118/25.0.19 cross site scripting (GHSA-45jj-r48j-75pp)
CVE-2024-41195 | Ocuco Innovation INNOVASERVICEINTF.EXE 2.10.24.17 TCP Packet improper authentication (EUVD-2024-54579)
CVE-2024-40458 | Ocuco Innovation Tracking.exe 2.10.24.51 TCP Packet input validation (EUVD-2024-54574)
CVE-2024-40459 | Ocuco Innovation APPMANAGER.EXE 2.10.24.51 Application Manager privileges management (EUVD-2024-54575)
CVE-2024-40460 | Ocuco Innovation JOBENTRY.EXE 2.10.24.51 privileges management (EUVD-2024-54576)
CVE-2024-40461 | Ocuco Innovation STOCKORDERENTRY.EXE 2.10.24.51 privileges management (EUVD-2024-54577)
CVE-2024-40462 | Ocuco Innovation SETTINGSVATIGATOR.EXE 2.10.24.51 privileges management (EUVD-2024-54578)
研究人员认为大模型既不会思考也不会推理
От манной каши — к базе ФБР: как США ставят клеймо на мигрантах-детях
SentinelOne Recovers: Platform Back Online After Extended Outage
On May 29, 2025, SentinelOne, a leading cybersecurity provider, experienced a significant platform outage that disrupted access to its commercial customer consoles worldwide. The incident began earlier in the day and was promptly acknowledged by SentinelOne, which communicated updates to its customers and partners through its support portal and direct messaging. The outage primarily affected […]
The post SentinelOne Recovers: Platform Back Online After Extended Outage appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach
CVE-2016-0793 | Red Hat WildFly up to 10.0.0 on Windows Blacklist Filter File information disclosure (ID 136323 / EDB-39573)
Hazy Hawk团伙利用DNS错误配置劫持可信域记录
阿迪达斯客户服务中心提供商遭受黑客攻击导致数据泄露
Why privacy in blockchain must start with open source
Traditionally, trust came from centralized institutions. Banks, payment networks, and clearinghouses are closed systems. Users cannot see the inner workings, but they rely on external audits, government regulation, and long histories of compliance to feel secure. It’s a model that has and continues to work, but it comes with trade-offs, namely: opacity, concentration of power, and limited innovation. A new model of trust With blockchains and decentralized applications (dApps), a new model of trust has … More →
The post Why privacy in blockchain must start with open source appeared first on Help Net Security.
Covenant Health Dealing With Cyberattack Affecting Hospitals
Covenant Health, a Catholic healthcare organization serving New England and parts of Pennsylvania, is dealing with a cyber incident that has forced the entity to take its IT systems offline, affecting services at several of its facilities. That includes some hospitals and medical testing labs.
CISA's New SIEM Guidance Tackles Visibility and Blind Spots
The Cybersecurity and Infrastructure Security Agency issued new guidance urging organizations to streamline Security Information and Event Management platform integration by prioritizing impactful log data and reducing blind spots that continue to plague even mature security operations centers.
Tenable Bolsters AI Controls With Apex Security Acquisition
Tenable is acquiring Israeli startup Apex Security to extend AI security features that go beyond asset discovery. With user-level controls and risk mitigation for AI usage, Tenable aims to accelerate its exposure management roadmap by integrating Apex into Tenable One later this year.