Security Bulletin

29 Aug 2025
Biztonsági szemle
Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
Generating exploits with AI and large language models shrinks the time to target software flaws, giving security teams scant time to patch. Can enterprises adapt?

28 Aug 2025
Biztonsági szemle
CISA, FBI, NSA Warn of Chinese 'Global Espionage System'
Three federal agencies were parties to a global security advisory this week warning about the extensive threat posed by Chinese nation-state actors targeting network devices.

28 Aug 2025
Biztonsági szemle
Hackers Steal 4M+ TransUnion Customers' Data
The credit reporting agency said the breach was "limited to specific data elements" and didn't include credit reports or core credit information.

28 Aug 2025
Biztonsági szemle
Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups
Flashpoint published its 2025 midyear ransomware report that highlighted the top five most prolific groups currently in operation.

28 Aug 2025
Biztonsági szemle
1,000+ Devs Lose Their Secrets to an AI-Powered Stealer
One of the most sophisticated supply chain attacks to date caused immense amounts of data to leak to the Web in a matter of hours.

28 Aug 2025
Biztonsági szemle
Dark Reading Confidential: A Guided Tour of Today's Dark Web
Dark Reading Confidential Episode 9: Join us for a look around today's Dark Web, and find out how law enforcement, AI, nation-state activities, and more are reshaping the way cybercriminals conduct their dirty business online. Keith Jarvis, senior...

28 Aug 2025
Biztonsági szemle
CISA's New SBOM Guidelines Get Mixed Reviews
Updated SBOM rules from CISA are a solid step toward making them more useful for cyber defenders but don't address many critical needs, experts say.

28 Aug 2025
Biztonsági szemle
CrowdStrike to Acquire Onum, Boost Falcon Next-Gen SIEM
This acquisition will bring Onum's real-time data pipeline to CrowdStrike's Falcon Next-Gen SIEM platform to deliver autonomous threat detection capabilities.

27 Aug 2025
Biztonsági szemle
Anthropic AI Used to Automate Data Extortion Campaign
The company said the threat actor abused its Claude Code service to "an unprecedented degree," automating reconnaissance, intrusions, and credential harvesting.

27 Aug 2025
Biztonsági szemle
'ZipLine' Phishers Flip Script as Victims Email First
"ZipLine" appears to be a sophisticated and carefully planned campaign that has already affected dozens of small, medium, and large organizations across multiple industry sectors.

27 Aug 2025
Biztonsági szemle
Nevada's State Agencies Shutter in Wake of Cyberattack
In response to a cyberattack that was first detected on Sunday, the governor shut down in-person services for state offices while restoration efforts are underway.

27 Aug 2025
Biztonsági szemle
China Hijacks Captive Portals to Spy on Asian Diplomats
The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites.
Pagination
- Previous page ‹‹
- Page 2
- Next page ››