Security Bulletin
30 Oct 2025
Biztonsági szemle
Data Security Posture Management — What Does 'Best in Class' Look Like?
The emergence of Data Security Posture Management (DSPM) in early 2023, followed by major acquisitions by companies like IBM, Thales, and Palo Alto Networks, demonstrates industry recognition of the need for a more holistic approach to data...
29 Oct 2025
Biztonsági szemle
Malicious NPM Packages Disguised With 'Invisible' Dependencies
In the "PhantomRaven" campaign, threat actors published 126 malicious npm packages that have flown under the radar, while collecting 86,000 downloads.
29 Oct 2025
Biztonsági szemle
AI Search Tools Easily Fooled by Fake Content
New research shows AI crawlers like Perplexity, Atlas, and ChatGPT are surprisingly easy to fool.
29 Oct 2025
Biztonsági szemle
Dentsu Subsidiary Breached, Employee Data Stolen
A subsidiary of Japanese marketing and PR giant Dentsu lost sensitive data to unidentified threat actors, the parent company said.
29 Oct 2025
Biztonsági szemle
Microsoft Security Change for Azure VMs Creates Pitfalls
Firms using Azure infrastructure gained a reprieve from a security-focused switch that could have broken apps that relied on public Internet access.
29 Oct 2025
Biztonsági szemle
Botnets Step Up Cloud Attacks Via Flaws, Misconfigurations
Infamous botnets like Mirai are exploiting Web-exposed assets such as PHP servers, IoT devices, and cloud gateways to gain control over systems and build strength.
29 Oct 2025
Biztonsági szemle
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
The best security training programs build strong security culture by focusing on high-risk groups, including developers, executives, and finance pros.
29 Oct 2025
Biztonsági szemle
Cybersecurity Firms See Surge in AI-Powered Attacks Across Africa
Africa becomes a proving ground for AI-driven phishing, deepfakes, and impersonation, with attackers testing techniques against governments and enterprises.
29 Oct 2025
Biztonsági szemle
AI-Generated Code Poses Security, Bloat Challenges
Development teams that fail to create processes around AI-generated code face more technical and security debt, as vulnerabilities get replicated.
28 Oct 2025
Biztonsági szemle
Inside the Data on Insider Threats: What 1,000 Real Cases Reveal About Hidden Risk
Security analyst Michael Robinson spent 14 months mining thousands of legal filings to uncover who malicious insiders really are, how they operate, and why traditional detection models keep missing them.
28 Oct 2025
Biztonsági szemle
From Chef to CISO: An Empathy-First Approach to Cybersecurity Leadership
Myke Lyons, CISO at data-processing SaaS company Cribl, shares how he cooked up an unconventional journey from culinary school to cybersecurity leadership.
28 Oct 2025
Biztonsági szemle
The AI Trust Paradox: Why Security Teams Fear Automated Remediation
Security teams invest in AI for automated remediation but hesitate to trust it fully due to fears of unintended consequences and lack of transparency.
Pagination
- Previous page ‹‹
- Page 56
- Next page ››