Aggregator
CVE-2026-4457 | Google Chrome up to 146.0.7680.75 V8 type confusion (ID 488803 / Nessus ID 303234)
CVE-2026-23244 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 nvme_pr_read_keys num_keys allocation of resources (EUVD-2026-12805 / Nessus ID 302911)
CVE-2026-23246 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc1 wifi ieee80211_ml_reconfiguration link_id out-of-bounds (EUVD-2026-12809 / Nessus ID 302910)
CVE-2026-23245 | Linux Kernel up to 6.18.17/6.19.7/7.0-rc2 call_rcu state issue (EUVD-2026-12808 / Nessus ID 302909)
CVE-2026-23050 | Linux Kernel up to 6.12.66/6.18.6/6.19-rc5 pNFS open deadlock (Nessus ID 297965 / WID-SEC-2026-0324)
Китай, США и полмиллиона дыр в безопасности. Старые серверы Microsoft превратились в легкую добычу
2026 Cybersecurity Excellence Awards Winners Announced during RSA Conference as AI Security Dominates
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-33017 Langflow Code Injection Vulnerability
This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Machine Learning Operations: Yesterday, Today, and Tomorrow
Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation
TeamPCP Expands Supply Chain Campaign With LiteLLM PyPI Compromise
Vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway
Organizations Overlook AI Risk as Governance Fails to Keep Up
The Kill Chain Is Obsolete When Your AI Agent Is the Threat
一场关于AI和安全度量产品的发布直播
Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
A slew of supply chain attacks against popular open source tools and packages appears to have been orchestrated by TeamPCP, a cybercriminal group that rose to prominence in late 2025. The latest victim of the group is BerryAI’s popular LiteLLM library, a unified interface that makes it easier for apps to switch between various LLMs: on March 24, TeamPCP uploaded two compromised versions (1.82.7 and 1.82.8) on PyPI that included a credential stealer and a … More →
The post LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks appeared first on Help Net Security.