Security Bulletin
30 Oct 2025
Biztonsági szemle
Critical Claroty Authentication Bypass Flaw Opened OT to Attack
CVE-2025-54603 gave attackers an opening to disrupt critical operational technology (OT) environments and critical infrastructure, plus steal data from them.
30 Oct 2025
Biztonsági szemle
LotL Attack Hides Malware in Windows Native AI Stack
Security programs trust AI data files, but they shouldn't: they can conceal malware more stealthily than most file types.
30 Oct 2025
Biztonsági szemle
Cloud Outages Highlight the Need for Resilient, Secure Infrastructure Recovery
Two massive technical outages over the past year underscore the need for cybersecurity teams to consider how to recover safely from disruptions without creating new security risks.
30 Oct 2025
Biztonsági szemle
Data Leak Outs Students of Iran's MOIS Training Academy
A school for the Iranian state hackers of tomorrow has itself, ironically, been hacked.
30 Oct 2025
Biztonsági szemle
Data Security Posture Management — What Does 'Best in Class' Look Like?
The emergence of Data Security Posture Management (DSPM) in early 2023, followed by major acquisitions by companies like IBM, Thales, and Palo Alto Networks, demonstrates industry recognition of the need for a more holistic approach to data...
29 Oct 2025
Biztonsági szemle
Malicious NPM Packages Disguised With 'Invisible' Dependencies
In the "PhantomRaven" campaign, threat actors published 126 malicious npm packages that have flown under the radar, while collecting 86,000 downloads.
29 Oct 2025
Biztonsági szemle
AI Search Tools Easily Fooled by Fake Content
New research shows AI crawlers like Perplexity, Atlas, and ChatGPT are surprisingly easy to fool.
29 Oct 2025
Biztonsági szemle
Dentsu Subsidiary Breached, Employee Data Stolen
A subsidiary of Japanese marketing and PR giant Dentsu lost sensitive data to unidentified threat actors, the parent company said.
29 Oct 2025
Biztonsági szemle
Microsoft Security Change for Azure VMs Creates Pitfalls
Firms using Azure infrastructure gained a reprieve from a security-focused switch that could have broken apps that relied on public Internet access.
29 Oct 2025
Biztonsági szemle
Botnets Step Up Cloud Attacks Via Flaws, Misconfigurations
Infamous botnets like Mirai are exploiting Web-exposed assets such as PHP servers, IoT devices, and cloud gateways to gain control over systems and build strength.
29 Oct 2025
Biztonsági szemle
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
The best security training programs build strong security culture by focusing on high-risk groups, including developers, executives, and finance pros.
29 Oct 2025
Biztonsági szemle
Cybersecurity Firms See Surge in AI-Powered Attacks Across Africa
Africa becomes a proving ground for AI-driven phishing, deepfakes, and impersonation, with attackers testing techniques against governments and enterprises.
Pagination
- Previous page ‹‹
- Page 17
- Next page ››