Security Bulletin
 
26 Mar 2025
      
            Biztonsági szemle
      
  Beyond STIX: Next-Level Cyber-Threat Intelligence
  While industry experts continue to analyze, interpret, and act on threat data, the complexity of cyber threats necessitates solutions that can quickly convert expert knowledge into machine-readable formats.
      
            
      
   
26 Mar 2025
      
            Biztonsági szemle
      
  'Lucid' Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
  Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols.
      
            
      
   
26 Mar 2025
      
            Biztonsági szemle
      
  New Testing Framework Helps Evaluate Sandboxes
  The Anti-Malware Testing Standards Organization published a Sandbox Evaluation Framework to set a standard among various sandbox offerings that help protect organizations from rising threats.
      
            
      
   
26 Mar 2025
      
            Biztonsági szemle
      
  Google Hastily Patches Chrome Zero-Day Exploited by APT
  Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware.
      
            
      
   
26 Mar 2025
      
            Biztonsági szemle
      
  Public-Private Ops Net Big Wins Against African Cybercrime
  Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals.
      
            
      
   
25 Mar 2025
      
            Biztonsági szemle
      
  Chinese hackers spend years roaming telecommunications service
  China Chopper malware allowed threat group "Weaver Ant" to remain undetected for years.
      
            
      
   
25 Mar 2025
      
            Biztonsági szemle
      
  Security Tech That Can Make a Difference During an Attack
  The recent report of how Volt Typhoon compromised systems at a water utility highlight security technologies and processes that helped detect the compromise and clean up the network.
      
            
      
   
25 Mar 2025
      
            Biztonsági szemle
      
  Security Tech That Can Make a Difference During an Attack
  The recent report of how Volt Typhoon compromised systems at a water utility highlight security technologies and processes that helped detect the compromise and clean up the network.
      
            
      
   
25 Mar 2025
      
            Biztonsági szemle
      
  Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet... - SWN #462
 
25 Mar 2025
      
            Biztonsági szemle
      
  OPSEC Nightmare: Leaking US Military Plans to a Reporter
  Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.
      
            
      
   
25 Mar 2025
      
            Biztonsági szemle
      
  South African Poultry Company Reports $1M Loss After Cyber Intrusion
  The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.
      
            
      
   
25 Mar 2025
      
            Biztonsági szemle
      
  Fate of DNA data raises privacy, identity issues in 23andMe bankruptcy
  Privacy advocates worry how the DNA data will be managed during company's Chapter 11 proceedings.
      
            
      
  Pagination
- Previous page ‹‹
- Page 176
- Next page ››