Toute l'actualité de la Cybersécurité
Optimizing Machine Learning Models with Precise Gradient Management in TensorFlow
2025-07-20 10:00:04
This guide explores TensorFlow's advanced gradient features using tf.GradientTape, including how to stop gradient recording, define custom gradients, use multiple tapes, compute higher-order derivatives,...
Tips for Writing Clean Code in TensorFlow 2
2025-07-20 09:00:04
This guide walks TensorFlow developers through best practices for TF2, including code modularization, tf.function usage, optimizer changes, custom training loops, metrics logging, and debugging tips....
Radiology Associates of Richmond data breach impacts 1.4 million people
2025-07-20 08:07:22
A data breach at Radiology Associates of Richmond has exposed the personal and health information of over 1.4 million individuals. Radiology Associates of Richmond has disclosed a data breach that impacted...
Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards
2025-07-20 06:13:00
Two significant Grafana vulnerabilities that could allow attackers to redirect users to malicious websites and execute arbitrary JavaScript code. The vulnerabilities, identified as CVE-2025-6023...
The TechBeat: Welcome to the Museum of AI Hallucinations (7/20/2025)
2025-07-20 06:10:56
How are you, hacker?
🪐Want to know what's trending right now?:
The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here.
...
Death by a Thousand AI Slops: How Fake Bugs Are Killing Bug Bounties
2025-07-20 05:03:39
AI-generated bug reports are overwhelming open source projects like curl. Maintainers are drowning in fake vulnerabilities, and it’s…Continue reading on InfoSec Write-ups »
DNS Poisoning: How Hackers Trick Your Internet
2025-07-20 05:03:35
Ever wonder how you type in “google.com” and — voila! — you’re there? It’s all thanks to something called DNS. But did you know hackers…Continue...
Extracting and Cracking NTLMv1 Hashes
2025-07-20 05:03:32
The Path from Capture to CompromiseWhether you're developing dashboards for metrics or automating repetitive, time-consuming tasks with custom scripts, scripting is an essential skill for any cybersecurity...
Bug Bounty Recon: Tokens, PII, and CI/CD Metadata Leaked via JavaScript
2025-07-20 05:03:26
IntroductionContinue reading on InfoSec Write-ups »
Did Your Exposed JS Files Just Get Your App Hacked?
2025-07-20 05:03:21
How I Found a Company’s API Keys in a Public JavaScript File (And Why Your App Could Be Next)Continue reading on InfoSec Write-ups »
How a GitHub Quirk Helped Me Earn K+ in Bug Bounties
2025-07-20 05:03:16
GitHub automatically redirects renamed usernames — until someone claims the old one. I built a scanner to find and hijack those links.This post builds on my earlier write-up about scanning GitHub...
Episode 2: OS Command Injection — Talking Directly to the Server's Brain
2025-07-20 05:03:14
Command Injection is a type of security flaw where a program accidentally lets an attacker run system commands. In simple terms, it…Continue reading on InfoSec Write-ups »
A Beginner-Friendly Guide to RCE, Command Injection, and More
2025-07-20 05:03:09
Welcome to the start of an exciting new series where we dive into the world of injection attacks — one of the most common (and dangerous)…Continue reading on InfoSec Write-ups...
Bug Bounties, Broken Promises
2025-07-20 05:02:58
Real stories of “won’t-fix” tags, scope tricks, and silent patches — plus a survival guide for new hunters…Continue reading on InfoSec Write-ups »
The Cybersecurity Library Your Boss Won't Share
2025-07-20 05:02:48
How a Nightshift Janitor Found the Corporate Security Playbook—In a Mop ClosetContinue reading on InfoSec Write-ups »
SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access
2025-07-20 04:40:18
A sophisticated cyberattack campaign targeting Microsoft SharePoint servers has been discovered exploiting a newly weaponized vulnerability chain dubbed “ToolShell,” enabling attackers to...
Fedora 41: PyPy Critical Path Traversal Fixes (FEDORA-2025-9b8da6ad7e)
2025-07-20 01:02:53
Update to 7.3.20 Security fixes for CVE-2025-47273, CVE-2024-47081 and CVE-2025-50181 (in pip and setuptools wheels)
Fedora 42: PyPy Critical Security Fix CVE-2025-47273, 2025-a37bf9ddbd
2025-07-20 00:47:05
Update to 7.3.20 Security fixes for CVE-2025-47273, CVE-2024-47081 and CVE-2025-50181 (in pip and setuptools wheels)