Security Bulletin
6 Aug 2026
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.
5 May 2026
Biztonsági szemle
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
19 Mar 2026
Biztonsági szemle
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
19 Feb 2026
Biztonsági szemle
Supply Chain Attack Secretly Installs OpenClaw for Cline Users
The malicious version of Cline's npm package — 2.3.0 — was downloaded more than 4,000 times before it was removed.
19 Feb 2026
Biztonsági szemle
Best-in-Class 'Starkiller' Phishing Kit Bypasses MFA
A user-friendly PhaaS tool beats standard methods for detecting phishing attacks by live-proxying legitimate login sites.
19 Feb 2026
Biztonsági szemle
Abu Dhabi Finance Week Exposed VIP Passport Details
Unprotected cloud data sends the wrong signal at a time when the emirate's trying to attract investors and establish itself as a global financial center.
19 Feb 2026
Biztonsági szemle
Connected and Compromised: When IoT Devices Turn Into Threats
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
19 Feb 2026
Biztonsági szemle
More Than 40% of South Africans Were Scammed in 2025
Survey underscores the reality that scammers follow "scalable opportunities and low friction," rather than rich targets that tend to be better protected.
18 Feb 2026
Biztonsági szemle
Scam Abuses Gemini Chatbots to Convince People to Buy Fake Crypto
A convincing presale site for phony "Google Coin" features an AI assistant that engages victims with a slick sales pitch, funneling payment to attackers.
18 Feb 2026
Biztonsági szemle
Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.
18 Feb 2026
Biztonsági szemle
Threat Intelligence Has a Human-Shaped Blind Spot
How I realized what I was taught to about threat intelligence was missing something crucial.
Pagination
- Page 1
- Next page ››