Security Bulletin
2 Oct 2025
Biztonsági szemle
Red Hat Investigates Widespread Breach of Private GitLab Repositories
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
2 Oct 2025
Biztonsági szemle
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.
2 Oct 2025
Biztonsági szemle
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
2 Oct 2025
Biztonsági szemle
Android Spyware in the UAE Masquerades as ... Spyware
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.
1 Oct 2025
Biztonsági szemle
Google Sheds Light on ShinyHunters' Salesforce Tactics
Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.
1 Oct 2025
Biztonsági szemle
Shutdown Threatens US Intel Sharing, Cyber Defense
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.
1 Oct 2025
Biztonsági szemle
A $50 'Battering RAM' Can Bust Confidential Computing
Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.
1 Oct 2025
Biztonsági szemle
Undead Operating Systems Haunt Enterprise Security Networks
Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.
1 Oct 2025
Biztonsági szemle
China Imposes One-Hour Reporting Rule for Major Cyber Incidents
The sweeping new regulations show that China's serious about hardening its own networks after launching widespread attacks on global networks.
30 Sep 2025
Biztonsági szemle
New China APT Strikes With Precision and Persistence
Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.
30 Sep 2025
Biztonsági szemle
'Klopatra' Trojan Makes Bank Transfers While You Sleep
A sophisticated new banking malware is hard to detect, capable of stealing lots of money, and infecting thousands of people in Italy and Spain.
30 Sep 2025
Biztonsági szemle
China Exploited New VMware Bug for Nearly a Year
A seemingly benign privilege-escalation process in VMware and other software has likely benefited attackers and other malware strains for years, researchers noted.
Pagination
- Previous page ‹‹
- Page 26
- Next page ››