Security Bulletin
11 Feb 2026
Biztonsági szemle
North Korea's UNC1069 Hammers Crypto Firms With AI
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.
11 Feb 2026
Biztonsági szemle
AI Rising: Do We Know Enough About the Data Populating It?
Organizations remain reluctant to address the fact that AI can dangerously expose business operations as well as personal data.
11 Feb 2026
Biztonsági szemle
Top Cyber Industry Defenses Spike CO2 Emissions
Organizations can improve their climate footprints by optimizing two specific cybersecurity protections, without incurring added risks.
11 Feb 2026
Biztonsági szemle
Riasztás Microsoft termékeket érintő sérülékenységekről – 2026. február
A Nemzetbiztonsági Szakszolgálat Nemzeti Kiberbiztonsági Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű...
11 Feb 2026
Biztonsági szemle
Tájékoztatás Adobe szoftverek sérülékenységeiről – 2026. február
A Nemzetbiztonsági Szakszolgálat Nemzeti Kiberbiztonsági Intézet (NBSZ NKI) tájékoztatót ad ki az Adobe szoftverfejlesztő cég termékeit érintő sérülékenységekkel kapcsolatban, azok súlyossága, valamint az egyes biztonsági hibákat érintő aktív...
11 Feb 2026
Biztonsági szemle
Asia Fumbles With Throttling Back Telnet Traffic in Region
Only Taiwan made the top 10 list of governments, effectively blocking the threat-ridden protocol, but overall the region lagged in curbing Telnet traffic.
10 Feb 2026
Biztonsági szemle
SolarWinds WHD Attacks Highlight Risks of Exposed Apps
Organizations that have exposed their instances of Web Help Desk to the public Internet have inadvertently made them prime targets for attackers.
10 Feb 2026
Biztonsági szemle
In Bypassing MFA, ZeroDayRAT Is 'Textbook Stalkerware'
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or targeted social engineering.
10 Feb 2026
Biztonsági szemle
Microsoft Patches 6 Actively Exploited Zero-Days
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
10 Feb 2026
Biztonsági szemle
How to Stay on Top of Future Threats With a Cutting-Edge SOC
CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security.
10 Feb 2026
Biztonsági szemle
Automaker Secures the Supply Chain With Developer-Friendly Platform
How a platform engineering team embeds supply chain security into infrastructure without slowing developers.
10 Feb 2026
Biztonsági szemle
TransUnion's Real Networks Deal Focuses on Robocall Blocking
The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.
Pagination
- Previous page ‹‹
- Page 7
- Next page ››