Security Bulletin
24 Nov 2025
Biztonsági szemle
ShadowRay 2.0 Turns AI Clusters into Crypto Botnets
A threat actor is leveraging a flaw in the Ray framework to hijack AI infrastructure worldwide and distribute a self-propagating cryptomining and data theft botnet.
24 Nov 2025
Biztonsági szemle
Critical Flaw in Oracle Identity Manager Under Exploitation
The exploitation of CVE-2025-61757 follows a breach of Oracle Cloud earlier this year as well as a recent extortion campaign targeting Oracle E-Business Suite customers.
24 Nov 2025
Biztonsági szemle
Infamous Shai-hulud Worm Resurfaces From the Depths
This campaign introduces a new variant that executes malicious code during preinstall, significantly increasing potential exposure in build and runtime environments, researchers said.
24 Nov 2025
Biztonsági szemle
Vision Language Models Keep an Eye on Physical Security
Advancements in vision language models expanded models reasoning capabilities to help protect employee safety.
21 Nov 2025
Biztonsági szemle
Deja Vu: Salesforce Customers Hacked Again, Via Gainsight
In a repeat of similar attacks during the summer, threat actors affiliated with the ShinyHunters extortion group used a third-party application to steal organizations' Salesforce data.
21 Nov 2025
Biztonsági szemle
LINE Messaging Bugs Open Asian Users to Cyber Espionage
In a potential gift to geopolitical adversaries, the encrypted messaging app uses a leaky custom protocol that allows message replays, impersonation attacks, and sensitive information exposure from chats.
21 Nov 2025
Biztonsági szemle
Cloudflare's One-Stop-Shop Convenience Takes Down Global Digital Economy
Even the most advanced systems like Cloudflare can fall victim to software issues and become a global point of failure, Dr. David Utzke argues, adding that the recent outage should be a warning for enterprises.
21 Nov 2025
Biztonsági szemle
Hack the Hackers: 6 Laws for Staying Ahead of the Attackers
A new security framework responds to a shift in attackers' tactics, one that allows them to infiltrate enterprises "silently" through their own policies.
21 Nov 2025
Biztonsági szemle
With AI Reshaping Entry-Level Cyber, What Happens to the Security Talent Pipeline?
Automation is rewriting early-career cybersecurity work, raising urgent questions about how the next generation of security professionals will gain real-world expertise.
21 Nov 2025
Biztonsági szemle
Switching to Offense: US Makes Cyber Strategy Changes
The US national cyber director describes the next cyber strategy as focusing "on shaping adversary behavior," adding consequences and aggressive response.
21 Nov 2025
Biztonsági szemle
Inside Iran's Cyber Objectives: What Do They Want?
The regime's cyber-espionage strategy employs dual-use targeting, collecting info that can support both military needs and broader political objectives.
21 Nov 2025
Biztonsági szemle
Securing the Win: What Cybersecurity Can Learn From the Paddock
A Formula 1 pit crew demonstrates the basic principles of how modern security teams should work.
Pagination
- Previous page ‹‹
- Page 3
- Next page ››