Security Bulletin
7 Aug 2025
Biztonsági szemle
Payback: 'ShinyHunters' Clocks Google via Salesforce
In 2024, it was Snowflake. In 2025, it's Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, Cisco, and Adidas.
7 Aug 2025
Biztonsági szemle
The Critical Flaw in CVE Scoring
With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.
7 Aug 2025
Biztonsági szemle
Chanel Alerts Clients of Third-Party Breach
The fashion house is added to a list of other companies that have been impacted by similar breaches, including Tiffany & Co. and Louis Vuitton.
7 Aug 2025
Biztonsági szemle
Tájékoztatás a SonicWall tűzfalakat érintő biztonsági incidensről
A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) tájékoztatót ad ki a SonicWall 7. generációs tűzfalakat érintő kibertámadás-hullámról, amely során támadók biztonsági réseken keresztül hatoltak be vállalati hálózatokba, többek...
7 Aug 2025
Biztonsági szemle
Researcher Deploys Fuzzer to Test Autonomous Vehicle Safety
As autonomous vehicles continue to evolve, new research highlights the importance of rigorous security testing to protect against both intentional attacks and unintentional unsafe commands in teleoperation systems.
7 Aug 2025
Biztonsági szemle
Critical Zero-Day Bugs Crack Open CyberArk, HashiCorp Password Vaults
Secrets managers hold all the keys to an enterprise's kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities.
6 Aug 2025
Biztonsági szemle
'ReVault' Security Flaws Impact Millions of Dell Laptops
The now-patched vulnerabilities exist at the firmware level and enable deep persistence on compromised systems.
6 Aug 2025
Biztonsági szemle
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
New research reveals that a malicious traffic distribution system (TDS) is run not by "hackers in hoodies," but by a series of corporations operating in the commercial digital advertising industry.
6 Aug 2025
Biztonsági szemle
Google Gemini AI Bot Hijacks Smart Homes, Turns Off the Lights
Using invisible prompts, the attacks demonstrate a physical risk that could soon become reality as the world increasingly becomes more interconnected with artificial intelligence.
6 Aug 2025
Biztonsági szemle
Attackers Exploit Critical Trend Micro Apex One Zero-Day Flaw
Two critical vulnerabilities affect the security vendor's management console, one of which is under active exploitation. The company has updated cloud-based products but won't have a patch for its on-premises version until mid-August.
6 Aug 2025
Biztonsági szemle
What CMMC 3.0 Really Means for Government Contractors
The ultimate goal of CMMC 3.0 is not just compliance — it's resilience.
6 Aug 2025
Biztonsági szemle
Phishers Abuse Microsoft 365 to Spoof Internal Users
The "Direct Send" feature simplifies internal message delivery for trusted systems, and the campaign successfully duped both Microsoft Defender and third-party secure email gateways.
Pagination
- Previous page ‹‹
- Page 35
- Next page ››