Security Bulletin

15 May 2025
Biztonsági szemle
Actively abused Ivanti EPMM zero-days fixed
SecurityWeek reports that updates have been issued by Ivanti to address a pair of zero-day vulnerabilities in its Endpoint Manager Mobile offering, which have been chained in ongoing attacks that were confirmed to have impacted very few of its...

15 May 2025
Biztonsági szemle
Critical Infrastructure Under Siege: OT Security Still Lags
With critical infrastructure facing constant cyber threats from the Typhoons and other corners, federal agencies and others are warning security for the OT network, a core technology in many critical sectors, is not powered up enough.

15 May 2025
Biztonsági szemle
Riasztás Microsoft termékeket érintő sérülékenységekről – 2025. május
A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek széleskörű...

15 May 2025
Biztonsági szemle
Tájékoztatás Adobe szoftverek sérülékenységeiről – 2025. május
A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) tájékoztatót ad ki az Adobe szoftverfejlesztő cég termékeit érintő sérülékenységekkel kapcsolatban, azok súlyossága, valamint az egyes biztonsági hibákat érintő aktív...

15 May 2025
Biztonsági szemle
Agentic AI used by threat actors to turbocharge cyberattacks
Palo Alto Networks researchers spot instances where threat actors are using AI platforms.

15 May 2025
Biztonsági szemle
European Vulnerability Database debuts amid CVE shakeup
The EUVD, maintained by ENISA, compiles information from the CVE program, CSIRTs and vendors.

14 May 2025
Biztonsági szemle
Infosec Layoffs Aren't the Bargain That Boards May Think
Salary savings come with hidden costs, including insider threats and depleted cybersecurity defenses, conveying advantages to skilled adversaries, experts argue.

14 May 2025
Biztonsági szemle
AI Agents May Have a Memory Problem
A new study by researchers at Princeton University and Sentient shows it's surprisingly easy to trigger malicious behavior from AI agents by implanting fake "memories" into the data they rely on for making decisions.

14 May 2025
Biztonsági szemle
Using a Calculator to Take Guesswork Out of Measuring Cyber-Risk
Organizations face the complex challenge of accurately measuring their cyber-risk across multiple variables. Resilience's risk calculator tool can help organizations measure their cyber-risk based on their own factors so that they can make informed...

14 May 2025
Biztonsági szemle
Ivanti EPMM Zero-Day Flaws Exploited in Chained Attack
The security software maker said the vulnerabilities in Endpoint Manager Mobile have been exploited in the wild against "a very limited number of customers" — for now — and stem from open source libraries.

14 May 2025
Biztonsági szemle
SAP NetWeaver flaw exploited by ransomware groups BianLian, RansomEXX
A second zero-day flaw was found in addition to exploitation of Netweaver by ransomware groups.

14 May 2025
Biztonsági szemle
RSAC 2025 executive interview: Saviynt's Amit Saha
Saviynt's Amit Saha breaks down the shortcomings of legacy IAM.
Pagination
- Previous page ‹‹
- Page 69
- Next page ››