Security Bulletin

6 Aug 2026
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.

17 Sep 2025
Biztonsági szemle
Microsoft Disrupts 'RaccoonO365' Phishing Service
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime.

17 Sep 2025
Biztonsági szemle
'Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree
Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual.

17 Sep 2025
Biztonsági szemle
AI-Powered Sign-up Fraud Is Scaling Fast
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.

17 Sep 2025
Biztonsági szemle
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.

17 Sep 2025
Biztonsági szemle
North Korean Group Targets South With Military ID Deepfakes
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.

16 Sep 2025
Biztonsági szemle
Ray Security Takes an Active Data Security Approach
A data security platform based on action is what the industry needs right now to protect enterprise data.

16 Sep 2025
Biztonsági szemle
Critical Bugs in Chaos Mesh Enable Cluster Takeover
"Chaotic Deputy" is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.

16 Sep 2025
Biztonsági szemle
Self-Replicating 'Shai-hulud' Worm Targets NPM Packages
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.

16 Sep 2025
Biztonsági szemle
'Vane Viper' Threat Group Tied to PropellerAds, Commercial Entities
Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.

16 Sep 2025
Biztonsági szemle
Innovative FileFix Phishing Attack Proves Plenty Potent
Highly deceptive FileFix uses code obfuscation and steganography and has been translated into at least 16 languages to power a global campaign.
Pagination
- Page 1
- Next page ››