Security Bulletin
5 Nov 2025
Biztonsági szemle
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
5 Nov 2025
Biztonsági szemle
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
4 Nov 2025
Biztonsági szemle
AI App Spending Report: Where Are the Security Tools?
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
4 Nov 2025
Biztonsági szemle
Pro-Russian Hackers Use Linux VMs to Hide in Windows
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
4 Nov 2025
Biztonsági szemle
Inside the Playbook of Ransomware's Most Profitable Players
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.
4 Nov 2025
Biztonsági szemle
Europe Sees Increase in Ransomware, Extortion Attacks
European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks.
4 Nov 2025
Biztonsági szemle
SesameOp Backdoor Uses OpenAI API for Covert C2
Malware used in a months-long attack demonstrates how bad actors are misusing generative AI services in unique and stealthy ways.
3 Nov 2025
Biztonsági szemle
Android Malware Mutes Alerts, Drains Crypto Wallets
Android/BankBot-YNRK is currently targeting users in Indonesia by masquerading as legitimate applications.
3 Nov 2025
Biztonsági szemle
Hackers Weaponize Remote Tools to Hijack Cargo Freight
Researchers uncovered a new threat campaign in which attackers use RMM tools to steal physical cargo out of the supply chain.
3 Nov 2025
Biztonsági szemle
Let's Get Physical: A New Convergence for Electrical Grid Security
The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical threats, together.
3 Nov 2025
Biztonsági szemle
AI Developed Code: 5 Critical Security Checkpoints for Human Oversight
To write secure code with LLMs developers must have the skills to use AI as a collaborative assistant rather than an autonomous tool, Madou argues.
3 Nov 2025
Biztonsági szemle
'TruffleNet' Attack Wields Stolen Credentials Against AWS
Reconnaissance and BEC are among the malicious activities attackers commit after compromising cloud accounts, using a framework based on the TruffleHog tool.
Pagination
- Previous page ‹‹
- Page 54
- Next page ››