top of page

Notícias

Vulnerabilidades

17 de junho de 2025

Sitecore CMS exploit chain starts with hardcoded 'b' password

A chain of Sitecore Experience Platform (XP) vulnerabilities allows attackers to perform remote code execution (RCE) without authentication to breach and hijack servers. [...]

17 de junho de 2025

Chained Flaws in Enterprise CMS Provider Sitecore Could Allow Remote Code Execution

WatchTowr has found three vulnerabilities in the Sitecore Experience Platform, used by HSBC and L'Oréal

17 de junho de 2025

Free AI coding security rules now available on GitHub

Developers are turning to AI coding assistants to save time and speed up their work. But these tools can also introduce security risks if they suggest flawed or unsafe code. To help address that, Secure Code Warrior has released a new set of free AI Security Rules on GitHub. These rulesets offer practical guidance to help developers write more secure code when using tools like GitHub Copilot, Cursor, Cline, Roo, Aider, and Windsurf. Designed specifically … More → The post Free AI coding security rules now available on GitHub appeared first on Help Net Security.

17 de junho de 2025

What Is Vulnerability Prioritization? A No-Fluff Playbook

Vulnerabilities, on their own, don't mean much. You could be staring at thousands of scanner alerts every week, but unless you know which ones truly matter, you're just reacting to... The post What Is Vulnerability Prioritization? A No-Fluff Playbook appeared first on Strobes Security. The post What Is Vulnerability Prioritization? A No-Fluff Playbook appeared first on Security Boulevard.

17 de junho de 2025

Researchers unearth keyloggers on Outlook login pages

Unknown threat actors have compromised internet-accessible Microsoft Exchange Servers of government organizations and companies around the world, and have injected the organizations' Outlook on the Web (OWA) login page with browser-based keyloggers, Positive Technologies researchers have warned. The keylogging JavaScript code (Source: Positive Technologies) The initial vector for compromise is unknown The researchers haven't been able to pinpoint how the attackers gained access to the compromised servers. Some of them were vulnerable to a slew … More → The post Researchers unearth keyloggers on Outlook login pages appeared first on Help Net Security.

16 de junho de 2025

Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities

Join us as we explore the concept of smart cities—municipalities enhanced by connected technology like sensors, cameras, and automated systems to improve services and infrastructure. We discuss the inherent vulnerabilities that come with these advancements, including cybersecurity threats and real-life incidents such as hacked crosswalk signals featuring voices of tech moguls. Our discussion covers how […] The post Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities appeared first on Shared Security Podcast. The post Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities appeared first on Security Boulevard.

16 de junho de 2025

High-Severity Vulnerabilities Patched in Tenable Nessus Agent

Three high-severity Tenable Agent vulnerabilities could allow users to overwrite and delete files, or execute arbitrary code, with System privileges. The post High-Severity Vulnerabilities Patched in Tenable Nessus Agent appeared first on SecurityWeek.

16 de junho de 2025

The Impact of Quantum Decryption

Executive Summary Quantum computing's rapid progress poses a significant threat, potentially rendering current encryption methods and nearly all encrypted data vulnerable. This includes sensitive data that has already been stolen... The post The Impact of Quantum Decryption appeared first on Cyber Defense Magazine.

15 de junho de 2025

claws - GitHub Actions Workflow Linter for Secure CI/CD Pipelines

claws is a GitHub Actions workflow linter that helps secure your CI/CD pipeline by identifying misconfigurations, risky triggers, and unsafe action usage before deployment.

14 de junho de 2025

How Can NHIs Enhance Overall System Security?

How Can NHIs Serve as the Crucial Backbone in Overall System Protection? What if there was a foolproof method for safeguarding your organization's systems and data from potential threats? A diligent layer of security that offers complete visibility and control over system vulnerabilities? The answer lies in the competent management of Non-Human Identities (NHIs) and […] The post How Can NHIs Enhance Overall System Security? appeared first on Entro. The post How Can NHIs Enhance Overall System Security? appeared first on Security Boulevard.

bottom of page