Security Bulletin
9 Jul 2025
Biztonsági szemle
Rubio Impersonator Signals Growing Security Threat From Deepfakes
An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophistication of and national security threat posed by the AI technology.
9 Jul 2025
Biztonsági szemle
Know Your Enemy: Understanding Dark Market Dynamics
To help counter crime, today's organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal.
9 Jul 2025
Biztonsági szemle
SatanLock Next in Line for Ransomware Group Shutdowns
Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims.
9 Jul 2025
Biztonsági szemle
Unlock Security Operations Success With Data Analysis
From data fog to threat clarity: Automating security analytics helps security teams stop fighting phantoms and respond to what matters.
9 Jul 2025
Biztonsági szemle
South Korean Government Imposes Penalties on SK Telecom for Breach
Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty but stiff regulatory requirements.
9 Jul 2025
Biztonsági szemle
AI Trust Score Ranks LLM Security
Startup Tumeryk's State of AI Trust finds Google Gemini Pro 2.5 as the most trustworthy, with OpenAI's GPT-4o mini a close second and DeepSeek and Alibaba Qwen scoring lowest.
8 Jul 2025
Biztonsági szemle
Microsoft Patches 137 CVEs in July, but No Zero-Days
Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint.
8 Jul 2025
Biztonsági szemle
Malicious Open Source Packages Spike 188% YoY
Data exfiltration was the most common malware in Sonatype report, with more than 4,400 packages designed to steal secrets, personally identifiable information, credentials, and API tokens.
8 Jul 2025
Biztonsági szemle
Suspected Hacker Linked to Silk Typhoon Arrested in Milan
The alleged Chinese state-sponsored hacker faces multiple charges, including wire fraud, aggravated identity theft, and unauthorized access to protected computers.
8 Jul 2025
Biztonsági szemle
Hackers 'Shellter' Various Stealers in Red-Team Tool to Evade Detection
Researchers have uncovered multiple campaigns spreading Lumma, Arechclient2, and Rhadamanthys malware by leveraging key features of the AV/EDR evasion framework.
8 Jul 2025
Biztonsági szemle
4 Critical Steps in Advance of 47-Day SSL/TLS Certificates
With certificate lifespans set to shrink by 2029, IT teams need to spend the next 100 days planning in order to avoid operational disruptions.
8 Jul 2025
Biztonsági szemle
TAG-140 Targets Indian Government Via 'ClickFix-Style' Lure
The threat actors trick victims into opening a malicious script, leading to the execution of the BroaderAspect .NET loader.
Pagination
- Previous page ‹‹
- Page 48
- Next page ››