Security Bulletin

6 Aug 2026
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.

13 Nov 2025
Biztonsági szemle
[Dark Reading Virtual Event] Know Your Enemy: How cybercriminals and nation-state hackers operate

16 Oct 2025
Biztonsági szemle
LevelBlue Announces Plans to Acquire XDR Provider Cybereason
The deal, which builds on LevelBlue’s recent acquisition of Trustwave and Aon, aims to provide customers with a broad portfolio of extended detection and response (XDR), managed detection and response (MDR), and forensic services.

15 Oct 2025
Biztonsági szemle
'Mysterious Elephant' Moves Beyond Recycled Malware
The cyber-espionage group has been using sophisticated custom tools to target government and diplomatic entities in South Asia since early 2025.

15 Oct 2025
Biztonsági szemle
F5 BIG-IP Environment Breached by Nation-State Actor
F5 disclosed a breach this week that included zero-day bugs, source code, and some customer information.

15 Oct 2025
Biztonsági szemle
Harvard University Breached in Oracle Zero-Day Attack
The Clop ransomware group claimed responsibility for stealing the university's data as part of a broader campaign against Oracle customers.

15 Oct 2025
Biztonsági szemle
Africa Remains Top Global Target, Even as Attacks Decline
Organizations across the continent saw 10% fewer attacks in September, but Africa remains the most attacked region in the world, leading the Global South.

14 Oct 2025
Biztonsági szemle
Microsoft Drops Terrifyingly Large October Patch Update
October 2025's enormous Patch Tuesday offers plenty of nightmares for admins, including actively exploited zero-days and insidious high-severity privilege-escalation bugs — and it spells curtains for Windows 10 updates.

14 Oct 2025
Biztonsági szemle
China's Flax Typhoon Turns Geo-Mapping Server into a Backdoor
Chinese APT threat actors compromised an organization's ArcGIS server, modifying the widely used geospatial mapping software for stealth access.

14 Oct 2025
Biztonsági szemle
Pixnapping Attack Lets Attackers Steal 2FA on Android
The proof-of-concept exploit allows an attacker to steal sensitive data from Gmail, Google Accounts, Google Authenticator, Google Maps, Signal, and Venmo.

13 Oct 2025
Biztonsági szemle
Financial, Other Industries Urged to Prepare for Quantum Computers
Despite daunting technical challenges, a quantum computer capable of breaking public-key encryption systems may only be a decade or two off.

13 Oct 2025
Biztonsági szemle
Critical infrastructure CISOs Can't Ignore 'Back-Office Clutter' Data
OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like Volt Typhoon, Pearce argues.
Pagination
- Page 1
- Next page ››