Security Bulletin
16 Apr 2025
Biztonsági szemle
MITRE support expires for 'pillar of cybersecurity industry,' CVE program
DHS contract to operate the Common Vulnerabilities and Exposures (CVE) Program will expire on April 16.
16 Apr 2025
Biztonsági szemle
Accounting Firms Can't Skimp on Cybersecurity
Cybercriminals capitalize on tax preparation stress, technology sprawl, and lax communications. Accounting teams can't afford to treat cybersecurity as an afterthought.
15 Apr 2025
Biztonsági szemle
QUBIT AI, Recall This, Defender, Tycoon, Slopsquatting, Feng Mengleng, Aaran Leyland - SWN #468
15 Apr 2025
Biztonsági szemle
Max Severity Bug in Apache Roller Enabled Persistent Access
The remediated flaw gave adversaries a way to maintain access to the app through password resets.
15 Apr 2025
Biztonsági szemle
With AI's Help, Bad Bots Are Taking Over the Web
Bad bots are becoming increasingly difficult to detect as they more easily mimic human behaviors and utilize evasion techniques, researchers say.
15 Apr 2025
Biztonsági szemle
AI-Powered Presentation Tool Leveraged in Phishing Attacks
Researchers at Abnormal Security said threat actors are using a legitimate presentation and graphic design tool named "Gamma" in phishing attacks.
15 Apr 2025
Biztonsági szemle
China's allegation that NSA hacked Asian Winter Games draws suspicion
Experts say companies need to step up cybersecurity during ongoing U.S.-China tensions.
15 Apr 2025
Biztonsági szemle
Hertz Falls Victim to Cleo Zero-Day Attacks
Customer data such as birth dates, credit card numbers and driver's license information were stolen when threat actors exploited zero-day vulnerabilities in Cleo-managed file transfer products.
15 Apr 2025
Biztonsági szemle
Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats
Russia-backed APT29's latest campaign once again uses malicious invites to wine-tasting events as its lure, but this time targets a different set of vintages — errr, victims — and delivers a novel backdoor, GrapeLoader.
15 Apr 2025
Biztonsági szemle
Are We Prioritizing the Wrong Security Metrics?
True security isn't about meeting deadlines — it's about mitigating risk in a way that aligns with business objectives while protecting against real-world threats.
15 Apr 2025
Biztonsági szemle
China-Backed Threat Actor 'UNC5174' Using Open Source Tools in Stealthy Attacks
Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.
15 Apr 2025
Biztonsági szemle
Dev teams turn to code-to-cloud for safety
This proactive strategy integrates security across every phase of the software development lifecycle, helping detect vulnerabilities early, reduce attack surfaces, and meet regulatory standards like GDPR and HIPAA.
Pagination
- Previous page ‹‹
- Page 151
- Next page ››