Aggregator
Submit #776245: itsourcecode Free Hotel Reservation System V1.0 Unrestricted Upload [Accepted]
Что такое SaaSpocalypse и почему облачные гиганты боятся, что клиенты начнут писать код сами?
嘶吼安全动态|工信部征求AI安全治理标准,规范模型上下文协议安全 浙江警方破获特大电商数据泄露案,200万条订单信息被贩卖
下周一截止!《2026 AI+网络安全产业生态图谱》调研申报即将结束
AI时代中国网络安全产业的五年变局|| 影子AI之困:企业数据安全最大的灰犀牛
A nearly undetectable LLM attack needs only a handful of poisoned samples
Prompt engineering has become a standard part of how large language models are deployed in production, and it introduces an attack surface most organizations have not yet addressed. Researchers have developed and tested a prompt-based backdoor attack method, called ProAttack, that achieves attack success rates approaching 100% on multiple text classification benchmarks without altering sample labels or injecting external trigger words. A defense paradigm for mitigating backdoor attacks through LoRA-based fine-tuning of language models (Source: … More →
The post A nearly undetectable LLM attack needs only a handful of poisoned samples appeared first on Help Net Security.
Нейросети больше не про котиков. ИИ превратился в главный инструмент для создания детской порнографии
Your facilities run on fragile supply chains and nobody wants to admit it
In this Help Net Security interview, Christa Dodoo, Global Chair at IFMA, discusses how facility managers are managing supply chain risk in critical building systems. She explains how sourcing, localized redundancy, and flexible infrastructure design are being integrated into resilience planning. Dodoo also shares practical approaches such as regional vendor networks, alternative contracts, and strategic inventory to maintain continuity during disruptions. Supply chains for critical building systems, HVAC components, fire suppression materials, access control hardware, … More →
The post Your facilities run on fragile supply chains and nobody wants to admit it appeared first on Help Net Security.
加拿大移民局根据 AI 虚构的工作描述拒绝移民申请
Who owns AI agent access? At most companies, nobody knows
AI agents are operating across production enterprise environments at scale, and the identity infrastructure managing their access has not kept up with their deployment. A January 2026 survey of 228 IT and security professionals, conducted by the Cloud Security Alliance, finds that the majority of organizations have AI agents active in core systems, with fragmented ownership of how those agents authenticate and what they can access. Agents are embedded in production systems Task-automation agents are … More →
The post Who owns AI agent access? At most companies, nobody knows appeared first on Help Net Security.
Когти больше не помеха. Химики придумали лак, который превращает ногти в стилус
Ghost SPN Attack Lets Hackers Conduct Stealthy Kerberoasting Under the Radar
A sophisticated evolution of Kerberoasting dubbed the “Ghost SPN” attack that allows adversaries to extract Active Directory credentials while erasing all traces of their activity, rendering traditional detection models effectively blind to the intrusion. The attack revealed by Trellix security researchers utilizes delegated administrative permissions, creating temporary exposure windows. Kerberoasting is a well-documented post-exploitation technique […]
The post Ghost SPN Attack Lets Hackers Conduct Stealthy Kerberoasting Under the Radar appeared first on Cyber Security News.
Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair
Many enterprise Linux deployments rely on hardware-level memory isolation to protect sensitive workloads from co-tenants and compromised hypervisors. Oracle’s Unbreakable Enterprise Kernel 8.2 (UEK 8.2) extends that capability on Oracle Linux with support for Intel Trust Domain Extensions, along with a set of file system and memory management changes intended to reduce downtime and improve diagnostic visibility. UEK 8.2 is based on the mainline long-term stable Linux 6.12 kernel and carries the release number 6.12.0-200. … More →
The post Unbreakable Enterprise Kernel 8.2 ships with confidential computing support, XFS live repair appeared first on Help Net Security.
Espilon CTF 2026
Date: March 11, 2026, noon — 26 March 2026, 00:00 UTC [add to calendar]
Format: Jeopardy
On-line
Offical URL: https://ctf.espilon.net/
Rating weight: 0
Event organizers: Espilon