Security Bulletin
7 Jan 2025
Biztonsági szemle
Purported UN civil aviation agency hack under investigation
Included in the stolen data trove were individuals' names, birthdates, gender, phone numbers, email addresses, addresses, education details, and employment information.
7 Jan 2025
Biztonsági szemle
Veracode Buys Package Analysis Technology From Phylum
The deal adds Phylum's technology for malicious package analysis, detection, and mitigation to Veracode's software composition analysis portfolio.
6 Jan 2025
Biztonsági szemle
In Appreciation: Amit Yoran, Tenable CEO, Passes Away
Cybersecurity industry visionary and renowned executive Amit Yoran has passed away after an almost one-year battle with cancer.
6 Jan 2025
Biztonsági szemle
China's Salt Typhoon Adds Charter, Windstream to Telecom Victim List
These latest attacks follow a long string of cyberattacks and breaches targeting US and global telecom and ISP companies.
6 Jan 2025
Biztonsági szemle
Cybersecurity industry mourns Amit Yoran, visionary Tenable CEO
Yoran died suddenly Jan. 3 after leave of absence for cancer treatment.
6 Jan 2025
Biztonsági szemle
FireScam Android Spyware Campaign Poses 'Significant Threat Worldwide'
A fake Telegram Premium app delivers information-stealing malware, in a prime example of the rising threat of adversaries leveraging everyday applications, researchers say.
6 Jan 2025
Biztonsági szemle
EagerBee Backdoor Takes Flight Against Mideast ISPs, Government Targets
The malware, operated by China-backed cyberattackers, has been significantly fortified with new evasive and post-infection capabilities.
6 Jan 2025
Biztonsági szemle
IoT's Regulatory Reckoning Is Overdue
New security regulations are more than compliance hurdles — they're opportunities to build better products, restore trust, and lead the next chapter of innovation.
6 Jan 2025
Biztonsági szemle
From threats to tactics: What to expect at Zero Trust World 2025
Zero Trust World 2025 will highlight the importance of “default-deny” strategies, practical cybersecurity applications, and fostering a collaborative IT security community through hands-on labs, case studies, and expert insights.
6 Jan 2025
Biztonsági szemle
Will AI Code Generators Overcome Their Insecurities This Year?
In just two years, LLMs have become standard for developers — and non-developers — to generate code, but companies still need to improve security processes to reduce software vulnerabilities.
6 Jan 2025
Biztonsági szemle
Windows LDAP vulnerability gains POC exploit
The compromise commences with the delivery of a CLDAP referral response packet to disrupt the Local Security Authority Subsystem Service before the subsequent sending of a DCE/RPC request to the targeted machine and the eventual designation of the...
6 Jan 2025
Biztonsági szemle
Crypto phishing losses surged in 2024
Wallet drainer attack activity was particularly elevated during the first three months of 2024, with the loss of $55.4 million worth of cryptocurrency in the year's biggest heist bringing stolen proceeds to $187 million, according to a study from...
Pagination
- Previous page ‹‹
- Page 272
- Next page ››