Aggregator
银狐木马应急响应实录:发现、取证与分析
【CVE-2026-28451】OpenClaw存在的SSRF 漏洞代码层面原理分析
CVE-2026-31975:Cloud CLI WebSocket Shell OS命令注入漏洞分析
软件安全赛初赛Re Crytpo Write up
回归基本功:关于skills,prompt engineering及其安全能力探索
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
CVE-2026-1312: Django order_by结合FilteredRelation使用导致的SQL注入漏洞
【CVE-2026-31816】 Budibase 未授权访问漏洞代码分析
Does your NHI system deliver essential value
Is Your Organization’s Non-Human Identity Strategy Robust Enough? What if the backbone of your organization’s cybersecurity strategy is more susceptible to breaches than you think? Where machine identities increasingly outnumber human ones, focusing on Non-Human Identities (NHIs) is critical. NHIs serve as the “tourists” navigating through vast cloud environments. Much like human identities, they require […]
The post Does your NHI system deliver essential value appeared first on Entro.
The post Does your NHI system deliver essential value appeared first on Security Boulevard.
Is your Agentic AI optimized for latest threats
What Are Non-Human Identities (NHIs) and Why Are They Critical in Cybersecurity? How do we ensure the security of these interactions? The concept of Non-Human Identities (NHIs) offers a compelling solution. NHIs, an advanced concept in cybersecurity, are designed to safeguard machine identities, ensuring that their actions are secure from creation to decommissioning. The Relevance […]
The post Is your Agentic AI optimized for latest threats appeared first on Entro.
The post Is your Agentic AI optimized for latest threats appeared first on Security Boulevard.
How relieved are you with your secrets vaulting strategy
Are You Confident in Your Secrets Vaulting Strategy? The management of machine identities—what the industry terms Non-Human Identities (NHIs)—has become a linchpin in safeguarding cloud environments. When organizations increasingly transition to cloud-based architectures, ensuring the security of NHIs and their associated secrets is paramount. But how can organizations feel truly reassured in their secrets vaulting […]
The post How relieved are you with your secrets vaulting strategy appeared first on Entro.
The post How relieved are you with your secrets vaulting strategy appeared first on Security Boulevard.
名单类型银狐样本的对抗分析
CVE-2026-4558 | Linksys MR9600 2.0.6.206937 SmartConnect.lua smartConnectConfigure os command injection
CVE-2026-4557 | code-projects Exam Form Submission 1.0 /admin/update_s1.php sname cross site scripting
高版本触发toString的几种方法
CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive
On March 20, 2026 at 20:45 UTC, Aikido Security detected an unusual pattern across the npm registry: dozens of packages from multiple organizations were receiving unauthorized patch updates, all containing the same hidden malicious code. What they had caught was CanisterWorm, a self-spreading npm worm deployed by the threat actor group TeamPCP. We track this […]
The post CanisterWorm: The Self-Spreading npm Attack That Uses a Decentralized Server to Stay Alive appeared first on Security Boulevard.