Security Bulletin
10 Jun 2025
Biztonsági szemle
Poisoned npm Packages Disguised as Utilities Aim for System Wipeout
Backdoors lurking in legitimate-looking code contain file-deletion commands that can destroy production systems and cause massive disruptions to software supply chains.
10 Jun 2025
Biztonsági szemle
SSH Keys: The Most Powerful Credential You're Probably Ignoring
SSH keys enable critical system access but often lack proper management. This security blind spot creates significant risk through untracked, unrotated credentials that persist across your infrastructure.
10 Jun 2025
Biztonsági szemle
Trump executive order alters Biden-era cybersecurity regulations
Order could have a ripple effect on private-sector identity management for contractors.
10 Jun 2025
Biztonsági szemle
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
10 Jun 2025
Biztonsági szemle
Complex npm attack uses 7-plus layers of obfuscation to spread Pulsar RAT
The package uses Japanese Unicode characters, hex encoding, Base64 and more to hide its actions.
9 Jun 2025
Biztonsági szemle
New Trump Cybersecurity Order Reverses Biden, Obama Priorities
The White House put limits on cyber sanctions, killed the digital ID program, and refocused the government's cyber activities to enabling AI, rolling out post-quantum cryptography, and promoting secure software design.
9 Jun 2025
Biztonsági szemle
OpenAI Bans ChatGPT Accounts Linked to Nation-State Threat Actors
The AI company's investigative team found that many accounts were using the program to engage in malicious activity around the world, such as employment schemes, social engineering, and cyber espionage.
9 Jun 2025
Biztonsági szemle
'Librarian Ghouls' Cyberattackers Strike at Night
Since at least December, the advanced persistent threat (APT) group has been using legit tools to steal data, dodge detection, and drop cryptominers on systems belonging to organizations in Russia.
9 Jun 2025
Biztonsági szemle
Gartner: How Security Teams Can Turn Hype Into Opportunity
During the opening keynote at Gartner Security & Risk Management Summit 2025, analysts weighed in on how CISOs and security teams can use security fervor around AI and other tech to the betterment of their security posture.
9 Jun 2025
Biztonsági szemle
Encryption and decryption: The foundation of data protection
Ensuring information remains confidential and secure is a core cybersecurity technique.
9 Jun 2025
Biztonsági szemle
SIEMs Missing the Mark on MITRE ATT&CK Techniques
CardinalOps' report shows that organizations are struggling to keep up with the evolution of the latest threats while a significant number of detection rules remain non-functional.
9 Jun 2025
Biztonsági szemle
Failed attack on SentinelOne reveals campaign by China-linked groups
Case underscores that security vendors at risk of attack, as are other industries.
Pagination
- Previous page ‹‹
- Page 117
- Next page ››