Security Bulletin
30 Apr 2025
Biztonsági szemle
RSAC 2025 executive interview: Security Scorecard's Aleksandr Yampolskiy
Security Scorecard's Dr. Aleksandr Yampolskiy discusses securing what you don't own with supply chain detection and response.
30 Apr 2025
Biztonsági szemle
RSAC 2025 executive interview: Fortra's Rohit Dhamankar
Fortra's Rohit Dhamankar discusses Cobalt Strike abuse decreases by 80% with Fortra, Microsoft, Health-ISAC initiative.
30 Apr 2025
Biztonsági szemle
RSAC 2025 executive interview: Okta's Charlotte Wylie
Okta's Charlotte Wylie discusses securing non-human identities at scale in the era of AI agents.
30 Apr 2025
Biztonsági szemle
Adversaries Are Toying With US Networks & DC Is Short on Answers
While nation-state actors are demonstrating how easily they can infiltrate US networks, government officials don't seem to have a clear vision for what comes next.
30 Apr 2025
Biztonsági szemle
RSAC 2025 executive interview: Cyware's Jawahar Sivasankaran
Cyware's Jawahar Sivasankaran discusses the role of cyber threat intelligence in maturing security operations.
30 Apr 2025
Biztonsági szemle
TheWizards APT Casts a Spell on Asian Gamblers With Novel Attack
A SLAAC-spoofing, adversary-in-the-middle campaign is hiding the WizardNet backdoor malware inside updates for legitimate software and popular applications.
30 Apr 2025
Biztonsági szemle
RansomHub outage takes Group-IB researchers by surprise
Outage shows how fast things change in the cyber underground.
30 Apr 2025
Biztonsági szemle
AI makes China leading threat to US critical infrastructure, says FBI official
China has been regarded by FBI Deputy Assistant Director Cynthia Kaiser to be the leading threat faced by U.S. critical infrastructure, with its state-backed threat operations leveraging artificial intelligence to facilitate increasingly efficient...
30 Apr 2025
Biztonsági szemle
Exposed Git configuration file scanning escalates
BleepingComputer reports that internet-exposed Git configuration files which could contain account credentials, access tokens, branch information, remote repository URLs, and automation scripts have been scanned by almost 4,800 unique IP addresses...
30 Apr 2025
Biztonsági szemle
Automated LockBit delivery facilitated by Phorpiex botnet
Threat actors have leveraged the Phorpiex botnet, also known as Trik, to enable automated deployment and execution of the LockBit ransomware payload as part of a new phishing attack campaign, according to Infosecurity Magazine.
30 Apr 2025
Biztonsági szemle
Uyghur leaders subjected to malware attack
Attacks involving a Windows-based surveillance malware have been launched against multiple senior members of the World Uyghur Congress as part of a new spear-phishing campaign discovered in early March, The Hacker News reports.
30 Apr 2025
Biztonsági szemle
Novel Gremlin Stealer malware emerges
Novel Gremlin Stealer malware emerges Data theft could be conducted by threat actors through the novel Gremlin Stealer malware, which has been promoted through the CoderSharp Telegram channel since mid-March, reports Infosecurity Magazine.
Pagination
- Previous page ‹‹
- Page 132
- Next page ››