Aggregator
CVE-2024-25392 | RT-Thread up to 5.0.2 var_export.c out-of-bounds (Issue 8290)
CVE-2024-25389 | RT-Thread up to 5.0.2 drivers/misc/rt_random.c entropy (Issue 8283)
CVE-2024-25393 | RT-Thread up to 5.0.2 net/at/src/at_server.c stack-based overflow (Issue 8288)
CVE-2024-3024 | appneta tcpreplay up to 4.4.4 get.c get_layer4_v6 heap-based overflow
CVE-2024-31615 | ThinkCMF 6.0.9 UeditorController.php unrestricted upload
CVE-2024-33444 | onethink 1.1 ModelModel.class.php sql injection (Issue 39)
CVE-2011-3483 | Wireshark 1.6.0/1.6.1 memory corruption (Bug 737785 / EDB-36128)
When AI agents go rogue, the fallout hits the enterprise
In this Help Net Security interview, Jason Lord, CTO at AutoRABIT, discusses the cybersecurity risks posed by AI agents integrated into real-world systems. Issues like hallucinations, prompt injections, and embedded biases can turn these systems into vulnerable targets. Lord calls for oversight, continuous monitoring, and human-in-the-loop controls to combat these threats. Many AI agents are built on foundation models or LLMs. How do the inherent unpredictabilities of these models—like hallucinations or prompt injections—translate into risks … More →
The post When AI agents go rogue, the fallout hits the enterprise appeared first on Help Net Security.
お知らせ:CyberNewsFlash「AiCloudが稼働するASUS製WiFiルーターからの通信の観測」
Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links
Cisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users that attackers could exploit the flaw to execute arbitrary code on targeted computers. Tracked as CVE-2025-20236, the vulnerability arises from improper input validation in the app’s custom URL parser, exposing users to remote code execution simply by clicking a specially crafted meeting […]
The post Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks
In the modern enterprise, network security teams face the daunting challenge of detecting and responding to multi-stage attacks that unfold over days or even weeks. Two of the most powerful tools in this battle are NetFlow and PCAP. NetFlow, often described as a metadata sentinel, provides a high-level summary of network traffic flows by recording […]
The post NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
FreeBuf早报 | CISA紧急拨款维持CVE漏洞数据库运转;攻击者滥用AI平台仿冒微软登录
Advanced Log Correlation Techniques For Real-Time Threat Detection
Log correlation has emerged as an essential technique, enabling security teams to connect seemingly isolated events across diverse systems to identify sophisticated attack patterns. By analyzing log data from different sources, organizations can detect advanced persistent threats that might otherwise remain hidden for weeks or months. This article explores cutting-edge log correlation techniques that enhance […]
The post Advanced Log Correlation Techniques For Real-Time Threat Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE не закрывается — критически важную программу спасли в последний момент
利用Node.js的恶意广告活动瞄准加密货币用户
Microsoft vulnerabilities: What’s improved, what’s at risk
Microsoft reported a record 1,360 vulnerabilities in 2024, according to the latest BeyondTrust Microsoft Vulnerabilities Report. The volume marks an 11% increase from the previous record in 2022 and fits within a broader post-pandemic trend: more vulnerabilities, more products, and more complex ecosystems. But one of the more telling metrics for CISOs is not just how many bugs were found — it’s how dangerous they were. In that regard, the data offers some good news. … More →
The post Microsoft vulnerabilities: What’s improved, what’s at risk appeared first on Help Net Security.