Security Bulletin
17 Sep 2025
Biztonsági szemle
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.
17 Sep 2025
Biztonsági szemle
North Korean Group Targets South With Military ID Deepfakes
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.
16 Sep 2025
Biztonsági szemle
Ray Security Takes an Active Data Security Approach
A data security platform based on action is what the industry needs right now to protect enterprise data.
16 Sep 2025
Biztonsági szemle
Critical Bugs in Chaos Mesh Enable Cluster Takeover
"Chaotic Deputy" is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.
16 Sep 2025
Biztonsági szemle
Self-Replicating 'Shai-hulud' Worm Targets NPM Packages
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.
16 Sep 2025
Biztonsági szemle
'Vane Viper' Threat Group Tied to PropellerAds, Commercial Entities
Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.
16 Sep 2025
Biztonsági szemle
Innovative FileFix Phishing Attack Proves Plenty Potent
Highly deceptive FileFix uses code obfuscation and steganography and has been translated into at least 16 languages to power a global campaign.
16 Sep 2025
Biztonsági szemle
Emerging Yurei Ransomware Claims First Victims
The cybercrime group, named after Japanese ghosts but believed to be from Morocco, uses a modified version of the Prince-Ransomware binary that includes a flaw allowing for partial data recovery. However, an extortion threat remains.
16 Sep 2025
Biztonsági szemle
SecurityScorecard Buys AI Automation Capabilities, Boosts Vendor Risk Management
The company acquired HyperComply to help enterprises automate vendor security reviews and gain a real-time picture of the security of their entire supply chain.
15 Sep 2025
Biztonsági szemle
'HybridPetya' Ransomware Bypasses Secure Boot
The malware, which has traits of Petya ransomware and the infamous NotPetya wiper, is designed to target UEFI-based systems, according to researchers.
15 Sep 2025
Biztonsági szemle
KillSec Ransomware Hits Brazilian Healthcare Software Provider
The ransomware gang breached a "major element" of the healthcare technology supply chain and stole sensitive patient data, according to researchers.
15 Sep 2025
Biztonsági szemle
FBI Warns of Threat Actors Hitting Salesforce Customers
The FBI's IC3 recently warned of two threat actors, UNC6040 and UNC6395, targeting Salesforce customers, separately and in tandem.
Pagination
- Previous page ‹‹
- Page 31
- Next page ››