Security Bulletin
18 Sep 2025
Biztonsági szemle
TikTok Deal Won't End Enterprise Risks
The proposed restructuring plan would address many concerns related to the social media platform, but risks remain for security teams.
18 Sep 2025
Biztonsági szemle
SonicWall Breached, Firewall Backup Data Exposed
Threat actors breached the MySonicWall service and accessed backup firewall configuration files belonging to "fewer than 5%" of its install base, according to the company.
18 Sep 2025
Biztonsági szemle
Mastering Digital Breadcrumbs to Stay Ahead of Evolving Threats
Digital forensics offers a challenging but rewarding career path for cybersecurity professionals willing to invest in specialized knowledge and continuous learning.
17 Sep 2025
Biztonsági szemle
The Cloud Edge Is The New Attack Surface
The cloud now acts as the connecting infrastructure for many companies' assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats.
17 Sep 2025
Biztonsági szemle
Microsoft Disrupts 'RaccoonO365' Phishing Service
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime.
17 Sep 2025
Biztonsági szemle
'Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree
Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual.
17 Sep 2025
Biztonsági szemle
AI-Powered Sign-up Fraud Is Scaling Fast
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.
17 Sep 2025
Biztonsági szemle
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.
17 Sep 2025
Biztonsági szemle
North Korean Group Targets South With Military ID Deepfakes
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.
16 Sep 2025
Biztonsági szemle
Ray Security Takes an Active Data Security Approach
A data security platform based on action is what the industry needs right now to protect enterprise data.
16 Sep 2025
Biztonsági szemle
Critical Bugs in Chaos Mesh Enable Cluster Takeover
"Chaotic Deputy" is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.
16 Sep 2025
Biztonsági szemle
Self-Replicating 'Shai-hulud' Worm Targets NPM Packages
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.
Pagination
- Previous page ‹‹
- Page 16
- Next page ››