Security Bulletin
20 Nov 2025
Biztonsági szemle
CISOs Get Real About Hiring in the Age of AI
Dark Reading Confidential Episode 12: Experts help cyber job seekers get noticed, make an argument for a need to return to the hacker ethos of a bygone era, and have a stark conversation about keeping AI from breaking the sector's talent pipeline for...
20 Nov 2025
Biztonsági szemle
Chinese APT Infects Routers to Hijack Software Updates
A unique take on the software update gambit has allowed "PlushDaemon" to evade attention as it mostly targets Chinese organizations.
20 Nov 2025
Biztonsági szemle
Same Old Security Problems: Cyber Training Still Fails Miserably
Editors from Dark Reading, Cybersecurity Dive, and TechTarget Search Security break down the depressing state of cybersecurity awareness campaigns and how organizations can overcome basic struggles with password hygiene and phishing attacks.
20 Nov 2025
Biztonsági szemle
‘Matrix Push’ C2 Tool Hijacks Browser Notifications
Have you ever given two seconds of thought to a browser notification? No? That's what hackers bent on phishing are counting on.
20 Nov 2025
Biztonsági szemle
WhatsApp 'Eternidade' Trojan Self-Propagates Through Brazil
The infostealer specifically targets Brazilian Portuguese speakers and combines malware designed to phish banking credentials and steal data, a worm, and some uniquely Brazilian quirks.
19 Nov 2025
Biztonsági szemle
Fortinet Woes Continue With Another WAF Zero-Day Flaw
A second zero-day vulnerability in its web application firewall (WAF) line has come under attack, raising more questions about the vendor's disclosure practices.
19 Nov 2025
Biztonsági szemle
Do National Data Laws Carry Cyber-Risks for Large Orgs?
When international corporations have to balance competing cyber laws from different countries, the result is fragmented, potentially vulnerable systems.
19 Nov 2025
Biztonsági szemle
The AI Attack Surface: How Agents Raise the Cyber Stakes
Researcher shows how agentic AI is vulnerable to hijacking to subvert an agent's goals and how agent interaction can be altered to compromise whole networks.
19 Nov 2025
Biztonsági szemle
Cloudflare Blames Outage on Internal Configuration Error
Initially though to be a DDoS attack, the incident was actually due to a routine change in permissions that caused widespread software failure.
19 Nov 2025
Biztonsági szemle
Critical Railway Braking Systems Open to Tampering
It only takes recycled cans, copper, and cheap gadgets off the Web to trick a train conductor into doing something dangerous.
19 Nov 2025
Biztonsági szemle
US Creates 'Strike Force' to Take Out SE Asian Scam Centers
The collaborative effort combines multiple federal departments, along with private companies to reduce, if not eliminate, billions lost annually to fraud.
18 Nov 2025
Biztonsági szemle
Cloud Break: IoT Devices Open to Silent Takeover Via Firewalls
IoT devices can be compromised, thanks to gaps in cloud management interfaces for firewalls and routers, even if they're protected by security software or not online.
Pagination
- Previous page ‹‹
- Page 4
- Next page ››