Security Bulletin
5 Nov 2025
Biztonsági szemle
Operational Technology Security Poses Inherent Risks for Manufacturers
Despite increased awareness, manufacturers continue to face an onslaught of attacks.
5 Nov 2025
Biztonsági szemle
Critical Site Takeover Flaw Affects 400K WordPress Sites
Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and website for nefarious purposes.
5 Nov 2025
Biztonsági szemle
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any...
5 Nov 2025
Biztonsági szemle
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.
5 Nov 2025
Biztonsági szemle
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
5 Nov 2025
Biztonsági szemle
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
4 Nov 2025
Biztonsági szemle
AI App Spending Report: Where Are the Security Tools?
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
4 Nov 2025
Biztonsági szemle
Pro-Russian Hackers Use Linux VMs to Hide in Windows
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
4 Nov 2025
Biztonsági szemle
Inside the Playbook of Ransomware's Most Profitable Players
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.
4 Nov 2025
Biztonsági szemle
Europe Sees Increase in Ransomware, Extortion Attacks
European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks.
4 Nov 2025
Biztonsági szemle
SesameOp Backdoor Uses OpenAI API for Covert C2
Malware used in a months-long attack demonstrates how bad actors are misusing generative AI services in unique and stealthy ways.
3 Nov 2025
Biztonsági szemle
Android Malware Mutes Alerts, Drains Crypto Wallets
Android/BankBot-YNRK is currently targeting users in Indonesia by masquerading as legitimate applications.
Pagination
- Previous page ‹‹
- Page 15
- Next page ››