Security Bulletin
19 Feb 2026
Biztonsági szemle
Connected and Compromised: When IoT Devices Turn Into Threats
Reused passwords, a lack of network segmentation, and poor sanitization processes make the Internet of Things' attack surfaces more dangerous.
19 Feb 2026
Biztonsági szemle
More Than 40% of South Africans Were Scammed in 2025
Survey underscores the reality that scammers follow "scalable opportunities and low friction," rather than rich targets that tend to be better protected.
18 Feb 2026
Biztonsági szemle
Scam Abuses Gemini Chatbots to Convince People to Buy Fake Crypto
A convincing presale site for phony "Google Coin" features an AI assistant that engages victims with a slick sales pitch, funneling payment to attackers.
18 Feb 2026
Biztonsági szemle
Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.
18 Feb 2026
Biztonsági szemle
Threat Intelligence Has a Human-Shaped Blind Spot
How I realized what I was taught to about threat intelligence was missing something crucial.
18 Feb 2026
Biztonsági szemle
Dell's Hard-Coded Flaw: A Nation-State Goldmine
A China-related attacker has exploited the vendor flaw since mid-2024, allowing it to move laterally, maintain persistent access, and deploy malware.
18 Feb 2026
Biztonsági szemle
A CISO's Playbook for Defending Data Assets Against AI Scraping
Discover a strategic approach to govern scraping risks, balance security with business growth, and safeguard intellectual capital from automated data harvesting.
18 Feb 2026
Biztonsági szemle
Singapore & Its 4 Major Telcos Fend Off Chinese Hackers
After detecting a zero-day attack, the country's effective response was attributed to the tight relationship between its government and private industry.
17 Feb 2026
Biztonsági szemle
Supply Chain Attack Embeds Malware in Android Devices
Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge.
17 Feb 2026
Biztonsági szemle
Poland Energy Survives Attack on Wind, Solar Infrastructure
Russia-aligned groups are probable culprits behind the wiper attacks against renewable energy farms, a manufacturer, and a heating and power plant.
17 Feb 2026
Biztonsági szemle
RMM Abuse Explodes as Hackers Ditch Malware
Remote monitoring and management (RMM) software offers hackers multiple benefits, including stealth, persistence, and operational efficiency.
17 Feb 2026
Biztonsági szemle
ClickFix Attacks Abuses DNS Lookup Command to Deliver ModeloRAT
ClickFix campaigns have adapted to the latest defenses with a new technique to trick users into infecting their own machines with malware.
Pagination
- Previous page ‹‹
- Page 5
- Next page ››