Security Bulletin
27 Jan 2026
Biztonsági szemle
Vibe-Coded 'Sicarii' Ransomware Can't Be Decrypted
A new ransomware strain that entered the scene last year has poorly designed code and an odd "Hebrew" identity that might be a false flag.
27 Jan 2026
Biztonsági szemle
Critical Telnet Server Flaw Exposes Forgotten Attack Surface
While telnet is considered obsolete, the network protocol is still used by hundreds of thousands of legacy systems and IoT devices for remote access.
27 Jan 2026
Biztonsági szemle
Microsoft Rushes Emergency Patch for Office Zero-Day
To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious Office file.
27 Jan 2026
Biztonsági szemle
'Stanley' Toolkit Turns Chrome Into Undetectable Phishing Vector
The malware-as-a-service kit enables malicious extensions to overlay pages on real websites without changing the visible URL, signaling a fresh challenge for enterprise security.
27 Jan 2026
Biztonsági szemle
WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data
The sportswear brand is investigating an alleged breach of its network that exposed some 188,347 files of highly sensitive corporate data.
27 Jan 2026
Biztonsági szemle
WorldLeaks Extortion Group Claims It Stole 1.4TB of Nike Data
The sportswear brand is investigating an alleged breach of its network that exposed some 188,347 files of highly sensitive corporate data.
27 Jan 2026
Biztonsági szemle
Hand CVE Over to the Private Sector
How MITRE has mismanaged the world's vulnerability database for decades and wasted millions along the way.
27 Jan 2026
Biztonsági szemle
Beauty in Destruction: Exploring Malware's Impact Through Art
Artistic initiatives turn cybersecurity into immersive exhibits at the Museum of Malware Art, transforming digital threats into thought-provoking experiences.
26 Jan 2026
Biztonsági szemle
Sandworm Blamed for Wiper Attack on Poland Power Grid
Researchers attributed the failed attempt to the infamous Russian APT Sandworm, which is notorious for wiper attacks on critical infrastructure organizations.
26 Jan 2026
Biztonsági szemle
DPRK's Konni Targets Blockchain Developers With AI-Generated Backdoor
The North Korean threat group is using a new PowerShell backdoor to compromise development environments and target cryptocurrency holdings, according to researchers.
24 Jan 2026
Biztonsági szemle
2025 Was a Wake-Up Call to Protect Human Decisions, Not Just Systems
Cybersecurity must shift from solely protecting systems to safeguarding human decision-making under uncertainty and system failures.
23 Jan 2026
Biztonsági szemle
Swipe, Plug-in, Pwned: Researchers Find New Ways to Hack Vehicles
Security researchers exploited dozens of vulnerabilities in vehicle infotainment systems and EV chargers during the latest Pwn2Own contest at Automotive World 2026.
Pagination
- Previous page ‹‹
- Page 12
- Next page ››