Security Bulletin

16 Apr 2025
Biztonsági szemle
Interlock ransomware evolves tactics with ClickFix, infostealers
The lesserknown ransomware group uses fake updaters on compromised sites to lure victims.

16 Apr 2025
Biztonsági szemle
Multiple Groups Exploit NTLM Flaw in Microsoft Windows
The attacks have been going on since shortly after Microsoft patched the vulnerability in March.

16 Apr 2025
Biztonsági szemle
China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks
Researchers discovered new variants of the malware, which is tied to a China-nexus threat group, targeting Windows environments of critical infrastructure networks in Europe.

16 Apr 2025
Biztonsági szemle
Ransomware gang 'CrazyHunter' Targets Critical Taiwanese Orgs
Trend Micro researchers detailed an emerging ransomware campaign by a new group known as "CrazyHunter" that is targeting critical sectors in Taiwan.

16 Apr 2025
Biztonsági szemle
NIST Updates Privacy Framework With AI and Governance Revisions
Changes aim to tighten integration with the National Institute of Standards and Technology's Cybersecurity Framework and help organizations develop a stronger posture to handle privacy risks.

16 Apr 2025
Biztonsági szemle
Patch Now: NVDIA Flaws Expose AI Models, Critical Infrastructure
A fix for a critical flaw in a tool allowing organizations to run GPU-accelerated containers released last year did not fully mitigate the issue, spurring the need to patch a secondary flaw to protect organizations that rely on NVIDIA processors for...

16 Apr 2025
Biztonsági szemle
Data interchange: A critical look at government efficiency and the Elon Musk effect
Optimization and efficiency must not come at the expense of People’s data (lives).

16 Apr 2025
Biztonsági szemle
Developers in the crosshairs of notorious DPRK crew 'Slow Pisces'
North Korea-linked group targets developers with job offers that lead to poisoned coding challenges.

16 Apr 2025
Biztonsági szemle
Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data
Cloud misconfigurations and cryptography flaws plague some of the top apps used in work environments, exposing organizations to risk and intrusion.

16 Apr 2025
Biztonsági szemle
Active Directory Recovery Can't Be an Afterthought
Active Directory is one of the most vulnerable access points in an organization's IT environment. Companies cannot wait for a real attack to pressure-test their AD recovery strategy.

16 Apr 2025
Biztonsági szemle
CISA funds CVE program in the 11th hour of contract with MITRE
Foundation to support CVE Program formally announced amid news that program was saved.

16 Apr 2025
Biztonsági szemle
UK jails LabHost PhaaS platform admin
Major phishing-as-a-service platform LabHost had its administrator Zak Coyne sentenced in the UK's Manchester Crown Court to 8.5 years imprisonment after he pleaded guilty to several charges related to fraudulent activity, reports Infosecurity...
Pagination
- Previous page ‹‹
- Page 41
- Next page ››