Aggregator
LLM安全相关的实践分析与讨论
土豆家族提权原理分析
非栈上格式化字符串的利用方法
D-Link 登录信息泄露(权限绕过)漏洞分析报告(CVE-2018-7034)
第一届OpenHarmony CTF专题赛RE题解
Linux提权由浅入深
Before scaling GenAI, map your LLM usage and risk zones
In this Help Net Security interview, Paolo del Mundo, Director of Application and Cloud Security at The Motley Fool, discusses how organizations can scale their AI usage by implementing guardrails to mitigate GenAI-specific risks like prompt injection, insecure outputs, and data leakage. He explains that as GenAI features proliferate, organizations must implement guardrails to manage risk, especially around input/output handling and fine-tuning practices. Establishing these controls early ensures safe, compliant adoption without compromising innovation. For … More →
The post Before scaling GenAI, map your LLM usage and risk zones appeared first on Help Net Security.
Roundcube Webmail(CVE-2025-49113)认证后php反序列化rce复现新视角
JAVA代码审计之鉴权逻辑错误审计小记
任意类加载环境下注入内存马
从2025d3ctf——d3jtar学习tomcat文件上传绕过(详解)
Struts2框架安全漏洞分析与利用研究
数字签名≠安全!XtremeRAT正利用大量国内数字签名「合法入侵」
CVE-2025-5337
云安全 - k8s ingress漏洞进一步探索引发的源码层面的文件特性分析(golang、java、php)
CURBy: A quantum random number generator you can verify
NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called the Colorado University Randomness Beacon (CURBy), the system offers a daily stream of certifiable random numbers generated through a process that no one can predict or manipulate. Instrumentation for the quantum random number generator (Source: NIST) For security professionals, randomness is essential. But most systems use pseudo-random numbers, which are generated by algorithms and can … More →
The post CURBy: A quantum random number generator you can verify appeared first on Help Net Security.