Security
Headlines
HeadlinesLatestCVEs

Tag

#vulnerability

Gom Player 2.3.92.5362 Buffer Overflow

Gom Player version 2.3.92.5362 suffers from a buffer overflow vulnerability.

Packet Storm
#vulnerability#windows#buffer_overflow
Gom Player 2.3.92.5362 DLL Hijacking

Gom Player version 2.3.92.5362 suffers from a dll hijacking vulnerability.

Poisoned Data, Malicious Manipulation: NIST Study Reveals AI Vulnerabilities

By Waqas NIST Unveils Insights on AI Vulnerabilities and Potential Threats.w This is a post from HackRead.com Read the original post: Poisoned Data, Malicious Manipulation: NIST Study Reveals AI Vulnerabilities

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations say their cybersecurity strategy has changed over the past two years.” This stagnation in strategy adaptation can be traced back to several key issues. Talent Retention Challenges: The cybersecurity field is rapidly advancing, requiring a

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming from software and infrastructure exposed to the internet; this ironically includes security tools, particularly firewalls and VPNs, which give attackers direct network access to execute their attacks. In fact, Gartner&

BlueHat India Call for Papers is Now Open!

You asked for it and it’s finally here! The inaugural BlueHat India conference will be held April 18-19, 2024, in Hyderabad, India! This intimate conference will bring together a unique blend of security researchers and responders, who come together as peers to exchange ideas, experiences, and learnings in the interest of creating a safer and more secure world for all.

NIST Warns of Security and Privacy Risks from Rapid AI System Deployment

The U.S. National Institute of Standards and Technology (NIST) is calling attention to the privacy and security challenges that arise as a result of increased deployment of artificial intelligence (AI) systems in recent years. “These security and privacy challenges include the potential for adversarial manipulation of training data, adversarial exploitation of model vulnerabilities to

File Sharing Wizard 1.5.0 Denial Of Service

File Sharing Wizard version 1.5.0 remote denial of service exploit.

How AI hallucinations are making bug hunting harder

People using LLMs for bug bounty hunts are wasting developers' time argues the lead developer of cURL. And he's probably right.

Explained: SMTP smuggling

Researchers have found flaws in the way SMTP servers handle messages, allowing them to send spoofed emails to and from targets.