Security Bulletin

4 Jul 2025
Biztonsági szemle
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491

4 Jul 2025
Biztonsági szemle
America’s blind spot: As drone production surges globally, U.S. counter-drone policy lags far behind
When Americans look to the skies on July 4th, we expect celebration—fireworks, light shows, and the kind of awe that reflects our national spirit. But in today’s world, those skies carry new meanings.

3 Jul 2025
Biztonsági szemle
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881

3 Jul 2025
Biztonsági szemle
AT&T rolls out protections to block SIM-swapping attacks
"Wireless Account Lock" allows customers to prevent the registration of new devices.

3 Jul 2025
Biztonsági szemle
CatWatchful stalkerware breach reveals 62K users, 26K victims
An SQL injection exploit exposed the users and owner of CatWatchful stalkerware.

3 Jul 2025
Biztonsági szemle
When AI goes off-script: Understanding the rise of prompt injection attacks
Attackers aren’t breaching firewalls — they’re slipping instructions into prompts. Here’s why OWASP named prompt injection the top GenAI risk, and what it means for security teams.

3 Jul 2025
Biztonsági szemle
Cisco patches critical 10.0 bug in Unified CM systems
A successful exploit could let an attacker log-in as the root user.

3 Jul 2025
Biztonsági szemle
Defending the prompt: How to secure AI against injection attacks
You can’t patch prompt injection, but you can outsmart it. OWASP’s latest guidance lays out a layered defense strategy for building safer, more resilient GenAI applications.

3 Jul 2025
Biztonsági szemle
New Cyber Blueprint Aims to Guide Organizations on AI Journey
Deloitte's new blueprint looks to bridge the gap between the massive push for AI adoption and a lack of preparedness among leaders and employees.

3 Jul 2025
Biztonsági szemle
Dark Web Vendors Shift to Third Parties, Supply Chains
As attacks on software supply chains and third parties increase, more data on critical software and infrastructure services is being advertised and sold on the Dark Web.

3 Jul 2025
Biztonsági szemle
Criminals Sending QR Codes in Phishing, Malware Campaigns
The Anti-Phishing Working Group observed how attackers are increasingly abusing QR codes to conduct phishing attacks or to trick users into downloading malware.

3 Jul 2025
Biztonsági szemle
IDE Extensions Pose Hidden Risks to Software Supply Chain
Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Security.
Pagination
- Page 1
- Next page ››