Security Bulletin

16 Jul 2025
Biztonsági szemle
Oracle Fixes Critical Bug in Cloud Code Editor
The bug allowed an attacker an easy way to compromise full suite of developer tools in Oracle Cloud Infrastructure.

16 Jul 2025
Biztonsági szemle
Women Who 'Hacked the Status Quo' Aim to Inspire Cybersecurity Careers
A group of female cybersecurity pioneers will share what they've learned about navigating a field dominated by men, in order to help other women empower themselves and pursue successful cybersecurity careers.

16 Jul 2025
Biztonsági szemle
Cognida.ai Launches Codien: An AI Agent to Modernize Legacy Test Automation and Fast-Track Test Creation

16 Jul 2025
Biztonsági szemle
Fully Patched SonicWall Gear Under Likely Zero-Day Attack
A threat actor with likely links to the Abyss ransomware group is leveraging an apparent zero-day vulnerability to deploy the "Overstep" backdoor on fully up-to-date appliances.

16 Jul 2025
Biztonsági szemle
Securing the Budget: Demonstrating Cybersecurity's Return
By tying security investments to measurable outcomes — like reduced breach likelihood and financial impact — CISOs can align internal stakeholders and justify spending based on real-world risk.

16 Jul 2025
Biztonsági szemle
Altered Telegram App Steals Chinese Users' Android Data
Using more than 600 domains, attackers entice Chinese-speaking victims to download a vulnerable Telegram app that is nearly undetectable on older versions of Android.

15 Jul 2025
Biztonsági szemle
ISC2 Finds Orgs Are Increasingly Leaning on AI
While many organizations are eagerly integrating AI into their workflows and cybersecurity practices, some remain undecided and even concerned about potential drawbacks of AI deployment.

15 Jul 2025
Biztonsági szemle
Lessons Learned From McDonald's Big AI Flub
McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to approximately 64 million job applicants.

15 Jul 2025
Biztonsági szemle
AI Is Reshaping How Attorneys Practice Law
Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly AI-influenced courtroom.

15 Jul 2025
Biztonsági szemle
AsyncRAT Spawns Concerning Labyrinth of Forks
Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprint of variants available across the spectrum of functionality.

15 Jul 2025
Biztonsági szemle
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.

15 Jul 2025
Biztonsági szemle
How Criminal Networks Exploit Insider Vulnerabilities
Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.
Pagination
- Previous page ‹‹
- Page 2
- Next page ››