Security Bulletin

14 May 2025
Biztonsági szemle
Hacktivists Make Little Impact During India-Pakistan Conflict
While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.

14 May 2025
Biztonsági szemle
Tycoon 2FA phishing kit update timeline reveals new evasion techniques
Browser fingerprinting and additional payload encryption are the most recent methods used.

14 May 2025
Biztonsági szemle
Microsoft fixes 75 vulnerabilities, 11 critical, in May Patch Tuesday
Patches include five vulnerabilities actively targeted in the wild, as well as two others with public exploit code available.

13 May 2025
Biztonsági szemle
Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.

13 May 2025
Biztonsági szemle
Windows Zero-Day Bug Exploited for Browser-Led RCE
Microsoft's May 2025 Patch Tuesday update also contains four other actively exploited zero-day security vulnerabilities, two publicly known bugs, and 12 critical patches.

13 May 2025
Biztonsági szemle
Chinese Actor Hit Taiwanese Drone Makers, Supply Chains
Tidrone concentrated on military entities and the satellite sector, using their associated service providers and ERP software to infect not just drones but all the entities that are part of their supply chains.

13 May 2025
Biztonsági szemle
Deepfake, South Korea, Moonlander, ChineseAI, FBI, AI damages professional reputation - SWN #476

13 May 2025
Biztonsági szemle
What Does EU's Bug Database Mean for Vulnerability Tracking?
The EU cyber agency ENISA has launched its vulnerability database, the EUVD; security experts shared their thoughts regarding what this means for CVEs, as well as the larger conversation around how bugs are tracked.

13 May 2025
Biztonsági szemle
TeleMessage Signal app lands on CISA's exploited vulnerability list
CISA responded to concerns that the flaw potentially lets attackers access entire message histories from Signal clones.

13 May 2025
Biztonsági szemle
CISA Warns of TeleMessage Vuln Despite Low CVSS Score
Though the app claims to use end-to-end encryption, hackers have reportedly accessed archived data on the app's servers via a new vulnerability.

13 May 2025
Biztonsági szemle
Think your cloud is secure? Three common misconfigurations you’re probably overlooking
Cloud security isn’t just about firewalls and permissions. Hidden missteps in your network architecture could be opening the door to costly breaches. Here are three oversights that full mesh SASE architecture helps eliminate.

13 May 2025
Biztonsági szemle
Your cloud is only as strong as its weakest link: How full mesh SASE closes hidden security gaps
Cloud adoption has transformed how businesses operate—but it’s also introduced new risks. From fragmented connectivity to poor visibility, traditional network architectures are full of blind spots. Harmony SASE’s full mesh design offers a smarter...
Pagination
- Page 1
- Next page ››