Notícias
Vulnerabilidades
25 de abril de 2025
Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25
Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long. What's the logical outcome? Increased exploitation in your production environment. The strategic imperative is clear: We must implement robust detection and response capabilities within production itself. Application Detection and Response (ADR) offers a vital solution to this escalating risk. The post Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25 appeared first on Security Boulevard.
25 de abril de 2025
Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others). Two of the flaws - CVE-2025-25184 and CVE-2025-27111 - could allow attackers to manipulate log content and entries, while the third one - CVE-2025-27610 - is a path traversal vulnerability that may allow attackers to gain unauthorized access to sensitive information. About CVE-2025-27610 Rack provides a standardized way for … More → The post Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610) appeared first on Help Net Security.
25 de abril de 2025
SAP NetWeaver zero-day allegedly exploited by an initial access broker
A zero-day in SAP NetWeaver is potentially being exploited, putting thousands of internet-facing applications at risk. Researchers warn that a zero-day vulnerability, tracked as CVE-2025-31324 (CVSS score of 10/10), in SAP NetWeaver is potentially being exploited. Thousands of internet-facing applications are potentially at risk. The flaw in SAP NetWeaver Visual Composer Metadata Uploader stems from a lack […]
25 de abril de 2025
Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification
Discover how proper secure coding practices can prevent costly data breaches and vulnerabilities. This comprehensive guide covers essential security principles, OWASP Top 10 mitigations, and language-specific techniques that every developer needs to implement in their SDLC. The post Secure Coding Practices Guide: Principles, Vulnerabilities, and Verification appeared first on Security Boulevard.
25 de abril de 2025
Rubrik Identity Resilience protects vulnerable authentication infrastructure
Rubrik announced its upcoming solution, Identity Resilience, designed to secure the entire identity landscape alongside data. Identity Resilience aims to protect the most common entry points for attackers - human and non-human identities (NHIs) - to help organizations maintain operations with minimal downtime. Identity Resilience aims to address a blindspot in enterprise security. A critical piece of infrastructure utilized by a vast majority of organizations, identity remains a consistent target for hackers. When compromised, these … More → The post Rubrik Identity Resilience protects vulnerable authentication infrastructure appeared first on Help Net Security.
25 de abril de 2025
All Major Gen-AI Models Vulnerable to 'Policy Puppetry' Prompt Injection Attack
A new attack technique named Policy Puppetry can break the protections of major gen-AI models to produce harmful outputs. The post All Major Gen-AI Models Vulnerable to 'Policy Puppetry' Prompt Injection Attack appeared first on SecurityWeek.