Toute l'actualité de la Cybersécurité


Optimizing Machine Learning Models with Precise Gradient Management in TensorFlow

2025-07-20 10:00:04
This guide explores TensorFlow's advanced gradient features using tf.GradientTape, including how to stop gradient recording, define custom gradients, use multiple tapes, compute higher-order derivatives,...

Lire la suite »

Tips for Writing Clean Code in TensorFlow 2

2025-07-20 09:00:04
This guide walks TensorFlow developers through best practices for TF2, including code modularization, tf.function usage, optimizer changes, custom training loops, metrics logging, and debugging tips....

Lire la suite »

Radiology Associates of Richmond data breach impacts 1.4 million people

2025-07-20 08:07:22
A data breach at Radiology Associates of Richmond has exposed the personal and health information of over 1.4 million individuals. Radiology Associates of Richmond has disclosed a data breach that impacted...

Lire la suite »

Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards

2025-07-20 06:13:00
Two significant Grafana vulnerabilities that could allow attackers to redirect users to malicious websites and execute arbitrary JavaScript code.  The vulnerabilities, identified as CVE-2025-6023...

Lire la suite »

The TechBeat: Welcome to the Museum of AI Hallucinations (7/20/2025)

2025-07-20 06:10:56
How are you, hacker? 🪐Want to know what's trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ...

Lire la suite »

Death by a Thousand AI Slops: How Fake Bugs Are Killing Bug Bounties

2025-07-20 05:03:39
AI-generated bug reports are overwhelming open source projects like curl. Maintainers are drowning in fake vulnerabilities, and it’s…Continue reading on InfoSec Write-ups »

Lire la suite »

DNS Poisoning: How Hackers Trick Your Internet

2025-07-20 05:03:35
Ever wonder how you type in “google.com” and — voila! — you’re there? It’s all thanks to something called DNS. But did you know hackers…Continue...

Lire la suite »

Extracting and Cracking NTLMv1 Hashes

2025-07-20 05:03:32
The Path from Capture to CompromiseWhether you're developing dashboards for metrics or automating repetitive, time-consuming tasks with custom scripts, scripting is an essential skill for any cybersecurity...

Lire la suite »

Bug Bounty Recon: Tokens, PII, and CI/CD Metadata Leaked via JavaScript

2025-07-20 05:03:26
IntroductionContinue reading on InfoSec Write-ups »

Lire la suite »

Did Your Exposed JS Files Just Get Your App Hacked?

2025-07-20 05:03:21
How I Found a Company’s API Keys in a Public JavaScript File (And Why Your App Could Be Next)Continue reading on InfoSec Write-ups »

Lire la suite »

How a GitHub Quirk Helped Me Earn K+ in Bug Bounties

2025-07-20 05:03:16
GitHub automatically redirects renamed usernames — until someone claims the old one. I built a scanner to find and hijack those links.This post builds on my earlier write-up about scanning GitHub...

Lire la suite »

Episode 2: OS Command Injection — Talking Directly to the Server's Brain

2025-07-20 05:03:14
Command Injection is a type of security flaw where a program accidentally lets an attacker run system commands. In simple terms, it…Continue reading on InfoSec Write-ups »

Lire la suite »

A Beginner-Friendly Guide to RCE, Command Injection, and More

2025-07-20 05:03:09
Welcome to the start of an exciting new series where we dive into the world of injection attacks — one of the most common (and dangerous)…Continue reading on InfoSec Write-ups...

Lire la suite »

Bug Bounties, Broken Promises

2025-07-20 05:02:58
Real stories of “won’t-fix” tags, scope tricks, and silent patches — plus a survival guide for new hunters…Continue reading on InfoSec Write-ups »

Lire la suite »

The Cybersecurity Library Your Boss Won't Share

2025-07-20 05:02:48
How a Nightshift Janitor Found the Corporate Security Playbook—In a Mop ClosetContinue reading on InfoSec Write-ups »

Lire la suite »

SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access

2025-07-20 04:40:18
A sophisticated cyberattack campaign targeting Microsoft SharePoint servers has been discovered exploiting a newly weaponized vulnerability chain dubbed “ToolShell,” enabling attackers to...

Lire la suite »

Fedora 41: PyPy Critical Path Traversal Fixes (FEDORA-2025-9b8da6ad7e)

2025-07-20 01:02:53
Update to 7.3.20 Security fixes for CVE-2025-47273, CVE-2024-47081 and CVE-2025-50181 (in pip and setuptools wheels)

Lire la suite »

Fedora 42: PyPy Critical Security Fix CVE-2025-47273, 2025-a37bf9ddbd

2025-07-20 00:47:05
Update to 7.3.20 Security fixes for CVE-2025-47273, CVE-2024-47081 and CVE-2025-50181 (in pip and setuptools wheels)

Lire la suite »