Aggregator
一场关于AI和安全度量产品的发布直播
Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose to prominence in late 2025. The latest victim of the group is BerryAI’s popular LiteLLM library, a unified interface that makes it easier for apps to switch between various LLMs: on March 24, TeamPCP uploaded two compromised versions (1.82.7 and 1.82.8) on PyPI that included a credential stealer and a … More →
The post LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks appeared first on Help Net Security.
CVE-2025-71161 | Linux Kernel up to 6.18.5 fec_read_bufs denial of service (Nessus ID 296381 / WID-SEC-2026-0215)
CVE-2025-71184 | Linux Kernel up to 6.12.65/6.18.5/6.19-rc4 btrfs_evict_inode null pointer dereference (EUVD-2025-206591 / Nessus ID 297464)
CVE-2023-53228 | Linux Kernel up to 6.2.15/6.3.2 amdgpu_cs_submit null pointer dereference (EUVD-2023-59856 / WID-SEC-2025-2053)
CVE-2025-39863 | Linux Kernel up to 6.6.104/6.12.45/6.16.5/6.17-rc4 brcmf_btcoex_detach use after free (Nessus ID 265463 / WID-SEC-2025-2099)
CVE-2024-49979 | Linux Kernel up to 6.10.13/6.11.2 gso frag_list null pointer dereference (3fdd8c83e83f/2d4a83a44428/17bd3bd82f9f / Nessus ID 216493)
CVE-2025-21676 | Linux Kernel up to 6.6.73/6.12.10 page_pool_dev_alloc_pages null pointer dereference (Nessus ID 216191 / WID-SEC-2025-0232)
CVE-2025-21682 | Linux Kernel up to 6.12.10 netdev_update_features null pointer dereference (Nessus ID 216191 / WID-SEC-2025-0232)
CVE-2024-47809 | Linux Kernel up to 6.6.65/6.12.4 dlm request_lock null pointer dereference (Nessus ID 216454 / WID-SEC-2025-0047)
CVE-2024-56719 | Linux Kernel up to 6.6.67/6.12.6 stmmac_tso_xmit allocation of resources (Nessus ID 231924 / WID-SEC-2025-1439)
CVE-2024-50298 | Linux Kernel up to 6.6.60/6.11.7 ndo_set_vf_mac null pointer dereference (ef0edfbe9eee/7eb923f8d481/e15c5506dd39 / Nessus ID 213018)
Ни копейки не пропало, но система сломалась. Главное о подозрительной активности в сети USR
Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
从4.8亿下载量的 LiteLLM投毒事件,看 AI 基础设施安全攻与防
Payload
You must login to view this content
Akamai Brand Guardian detects and removes AI-driven brand impersonation
Akamai has introduced Akamai Brand Guardian, an evolution of Brand Protector that uses AI to identify and manage brand impersonation at scale. Scammers are exploiting the widespread availability of generative AI to deploy sophisticated fake websites and digital identities in seconds, making it nearly impossible for businesses to keep pace using manual discovery methods. For companies in sectors like financial services, retail, and healthcare, these fraudulent sites threaten digital integrity, which often leads to lost … More →
The post Akamai Brand Guardian detects and removes AI-driven brand impersonation appeared first on Help Net Security.