Recently added artificial intelligence capabilities on the Chinese-language Darcula phishing-as-a-service platform make phishing attacks easy for even the least technical hackers.
A 2025. 17. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.04.17. és 2025.04.24. között kezelt incidensek statisztikai adatait is tartalmazza.
Example of a Payload Delivered Through Steganography, (Fri, Apr 25th)
In this diary, I'll show you a practical example of how steganography is used to hide payloads (or other suspicious data) from security tools and Security Analysts' eyes. Steganography can be defined like this: It is the art and science of...
'SessionShark' ToolKit Evades Microsoft Office 365 MFA
The creators of the toolkit are advertising it as an educational and ethical resource, but what it promises to provide users if purchased indicates it's anything but.
Digital Twins Bring Simulated Security to the Real World
By simulating business environments or running software, while incorporating real-time data from production systems, companies can model the impact of software updates, exploits, or disruptions.
Though already patched, the vulnerability is especially problematic because of the highly privileged access it offers to business-critical systems, sensitive data, and backups for attackers.
Researchers at security vendor Cleafy detailed a malware known as "SuperCard X" that uses the NFC reader on a victim's own phone to steal credit card funds instantly.