Security Bulletin
29 Jul 2025
Biztonsági szemle
The Hidden Threat of Rogue Access
With the right IGA tools, governance policies, and risk thresholds, enterprises can continuously detect and act on rogue access before attackers do.
29 Jul 2025
Biztonsági szemle
Supply Chain Attacks Spotted in GitHub Actions, Gravity Forms, npm
Researchers discovered backdoors, poisoned code, and malicious commits in some of the more popular tool developers, jeopardizing software supply chains.
28 Jul 2025
Biztonsági szemle
Root Evidence Bets on New Concept for Vulnerability Patch Management
The number of concerning vulnerabilities may be much smaller than organizations think, and this cybersecurity startup aims to narrow down the list to the most critical ones.
28 Jul 2025
Biztonsági szemle
Insurance Giant Allianz Life Grapples With Breach Affecting 'Majority' of Customers
The company has yet to report an exact number of how many individuals were impacted by the breach and plans to start the notification process around Aug. 1.
28 Jul 2025
Biztonsági szemle
Chaos Ransomware Rises as BlackSuit Gang Falls
Researchers detailed a newer double-extortion ransomware group made up of former members of BlackSuit, which was recently disrupted by international law enforcement.
28 Jul 2025
Biztonsági szemle
Ghost Students Drain Money, Resources From Educational Sector
The education sector is haunted by a significant fraud problem where fake students impersonate celebrities and employ other identity techniques to steal resources and money from legitimate students.
28 Jul 2025
Biztonsági szemle
New Risk Index Helps Organizations Tackle Cloud Security Chaos
Enterprises can use the IaC Risk Index to identify vulnerable cloud resources in their infrastructure-as-code environment which are not managed or governed.
28 Jul 2025
Biztonsági szemle
Sophisticated Shuyal Stealer Targets 19 Browsers, Demonstrates Advanced Evasion
A new infostealing malware making the rounds can exfiltrate credentials and other system data even from browsing software considered more privacy-focused than mainstream options.
28 Jul 2025
Biztonsági szemle
How to Spot Malicious AI Agents Before They Strike
The rise of agentic AI means the battle of the machines is just beginning. To win, we'll need our own agents — human and machine — working together.
25 Jul 2025
Biztonsági szemle
Cyber Career Opportunities: Weighing Certifications vs. Degrees
Longtime CISO Melina Scotto joins Dark Reading to discuss career advice gleaned from her 30 years in the cyber industry.
25 Jul 2025
Biztonsági szemle
'Fire Ant' Cyber Spies Compromise Siloed VMware Systems
Suspected China-nexus threat actors targeted virtual environments and used several tools and techniques to bypass security barriers and reach isolated portions of victims' networks.
25 Jul 2025
Biztonsági szemle
AI-Generated Linux Miner 'Koske' Beats Human Malware
AI malware is becoming less of a gimmick, with features that meet or exceed what traditional human-developed malware typically can do.
Pagination
- Previous page ‹‹
- Page 40
- Next page ››