Aggregator
CVE-2026-4924 | Devolutions Server up to 2026.1.11 2FA weak authentication (DEVO-2026-0010)
CVE-2026-4828 | Devolutions Server up to 2026.1.11 OAuth Login weak authentication (DEVO-2026-0010)
CVE-2026-30291 | Ora Tools PDF Reader App 4.3.5 access control (ID 18 / EUVD-2026-17891)
分享一下最近挖的两个0Day的思路
CVE-2026-30523 | SourceCodester Loan Management System 1.0 Loan Plans months logic error (EUVD-2026-17897)
百度多辆无人驾驶出租车同时发生故障
CVE-2026-30573 | SourceCodester Pharmacy Product Management System 1.0 add-sales.php txtprice/txttotalcost behavioral workflow (EUVD-2026-17901)
BLE 蓝牙协议:抓包实战 (HCI + 空口)
5 AWS AI Controls Every Security Team Should Have
Most teams govern AI workloads at the application layer. They configure guardrails for their Bedrock agents, scope IAM roles per workload, and build policies around approved models. That discipline matters, but it breaks down the moment a developer spins up a new account or invokes a model directly without touching the application stack. Org-level enforcement […]
The post 5 AWS AI Controls Every Security Team Should Have appeared first on Security Boulevard.
Red Canary CFP tracker: April 2026
CVE-2026-27498:n8n组合拳RCE三功能叠加实现权限接管
CVE-2026-30877 | baserproject basercms up to 5.2.2 User Account update os command injection (GHSA-m9g7-rgfc-jcm7 / CNNVD-202603-6291)
CVE-2025-32957 | baserproject basercms up to 5.2.2 require_once unrestricted upload (GHSA-hv78-cwp4-8r7r / CNNVD-202603-6293)
CVE-2026-21861 | baserproject basercms up to 5.2.2 exec os command injection (GHSA-qxmc-6f24-g86g / CNNVD-202603-6295)
CVE-2026-27697 | baserproject basercms up to 5.2.2 Blog Post sql injection (GHSA-vh89-rjph-2g7p / CNNVD-202603-6292)
48 Hours: The Window Between Infostealer Infection and Dark Web Sale
New research maps the full infostealer lifecycle. Your credentials go from an employee’s device to an underground marketplace in less time than it takes your security team to notice anything is wrong. On March 24, 2026, researchers at Whiteintel’s Intelligence Division published a detailed map of the full infostealer lifecycle, tracing the exact sequence from […]
The post 48 Hours: The Window Between Infostealer Infection and Dark Web Sale appeared first on Security Boulevard.
实战:我如何用AI分析Coruna iOS漏洞利用工具包?
瑞典回归传统的基于纸质的课堂教育模式
The Anthropic Code Leak: When a Packaging Error Becomes a Supply Chain Risk
In March 2026, portions of Anthropic’s internal “Claude Code” were exposed publicly through an npm package misconfiguration. The incident was […]
The post The Anthropic Code Leak: When a Packaging Error Becomes a Supply Chain Risk appeared first on HawkEye.