Security Bulletin

2 Jan 2025
Biztonsági szemle
Cybersecurity regulations in 2025: Key insights from top industry experts
New regulations in the EU come online early in 2025, while state governments are expected to crack down on AI, security pros say.

2 Jan 2025
Biztonsági szemle
Chinese cyberattacks escalated in 2024
Chinese state-sponsored threat operation Volt Typhoon, also known as Vanguard Panda, was regarded by CrowdStrike Senior Vice President of Counter Adversary Operations Adam Meyers to be among the more concerning China-linked threats after pre...

2 Jan 2025
Biztonsági szemle
Ford confirms X account hack
Ford Motor Company has disclosed having its account on X, formerly Twitter, breached following posts expressing pro-Palestine and anti-Israel sentiment on Monday.

2 Jan 2025
Biztonsági szemle
MetLife denies RansomHub claims of breach
Cybernews reports that MetLife was claimed to have been compromised by the RansomHub ransomware-as-a-service operation, which alleged the theft of 1 TB of data from the major global insurance company's systems. The insurance company, however, denied...

2 Jan 2025
Biztonsági szemle
Fraudulent rating-boosting stars prevalent in GitHub
Over 15,800 GitHub repositories have been given 3.1 million inauthentic stars meant to bolster their legitimacy and reach, with almost 16% of repositories awarded 50 stars in July leveraged in malicious campaigns.

2 Jan 2025
Biztonsági szemle
Azure compromise possible with Apache Airflow vulnerabilities
After facilitating initial access through the creation and uploading of a directed acrylic graph file to GitHub that enabled reverse shell deployment, threat actors could proceed to exploit the Kubernetes misconfiguration to achieve cluster takeovers...

2 Jan 2025
Biztonsági szemle
Clickjacking protections evaded by novel exploit
Attacks using DoubleClickJacking commence with visits to a malicious site redirecting to a new tab or window without any user interaction, which will be followed by a CAPTCHA verification triggering a double-click that prompts the exploitation of the...

2 Jan 2025
Biztonsági szemle
'Bad Likert Judge' Jailbreak Bypasses Guardrails of OpenAI, Other Top LLMs
A novel technique to stump artificial intelligence (AI) text-based systems increases the likelihood of a successful cyberattack by 60%.

2 Jan 2025
Biztonsági szemle
AWS leveraged in EC2 Grouper attacks
After obtaining credentials from code repositories, EC2 Grouper utilizes PowerShell and other AWS tools to initiate compromise before exploiting APIs to enable reconnaissance and resource provisioning, as well as establish unique security groups...

2 Jan 2025
Biztonsági szemle
More details on widespread Chrome extension compromise emerge
While Google Groups and LinkedIn reports noted the campaign to have commenced in early December, such an attack may have been tested since March as evidenced by command-and-control subdomains discovered by BleepingComputer.

1 Jan 2025
Biztonsági szemle
2025 Forecast: AI to supercharge attacks, quantum threats grow, SaaS security woes
SC Media's 2025 annual roundup of predictions, forecasts and warnings for the year ahead by top cybersecurity experts.

31 Dec 2024
Biztonsági szemle
Ransomware 2024: A year of tricks, traps, wins and losses
From healthcare to critical infrastructure, 2024 ransomware attacks redefined the stakes for lives, economies, and national security.
Pagination
- Previous page ‹‹
- Page 248
- Next page ››