Security Bulletin
10 Feb 2026
Biztonsági szemle
In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
10 Feb 2026
Biztonsági szemle
Microsoft Patches 6 Actively Exploited Zero-Days
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
10 Feb 2026
Biztonsági szemle
How to Stay on Top of Future Threats With a Cutting-Edge SOC
CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.
10 Feb 2026
Biztonsági szemle
Automaker Secures the Supply Chain With Developer-Friendly Platform
How a platform engineering team embeds supply chain security into infrastructure without slowing developers.
10 Feb 2026
Biztonsági szemle
TransUnion's Real Networks Deal Focuses on Robocall Blocking
The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.
9 Feb 2026
Biztonsági szemle
Warlock Gang Breaches SmarterTools Via SmarterMail Bugs
The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product.
9 Feb 2026
Biztonsági szemle
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
9 Feb 2026
Biztonsági szemle
TeamPCP Turns Cloud Infrastructure into Crime Bots
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces.
9 Feb 2026
Biztonsági szemle
Black Basta Bundles BYOVD With Ransomware Payload
Researchers discovered a newly disclosed vulnerable driver embedded in Black Basta's ransomware, illustrating the increasing popularity of the defense-evasion technique.
9 Feb 2026
Biztonsági szemle
What Organizations Need to Change When Managing Printers
Ask the Expert: Organizations need to close the ownership vacuum, establish durable security controls, and ensure printers are protected as rigorously as other endpoints.
6 Feb 2026
Biztonsági szemle
'Encrypt It Already' Campaign Pushes Big Tech to Prioritize E2E Encryption
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use.
6 Feb 2026
Biztonsági szemle
Shai-hulud: The Hidden Cost of Supply Chain Attacks
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.
Pagination
- Previous page ‹‹
- Page 27
- Next page ››