Security Bulletin
26 Nov 2025
Biztonsági szemle
Iran Exploits Cyber Domain to Aid Kinetic Strikes
The country deploys "cyber-enabled kinetic targeting" prior to — and following — real-world missile attacks against ships and land-based targets.
25 Nov 2025
Biztonsági szemle
Advanced Security Isn't Stopping Ancient Phishing Tactics
New research reveals that sophisticated phishing attacks consistently bypass traditional enterprise security measures.
25 Nov 2025
Biztonsági szemle
Cheap Hardware Module Bypasses AMD, Intel Memory Encryption
Researchers built an inexpensive device that circumvents chipmakers' confidential computing protections and reveals weaknesses in scalable memory encryption.
25 Nov 2025
Biztonsági szemle
DPRK's FlexibleFerret Tightens macOS Grip
The actor behind the "Contagious Interview" campaign is continuing to refine its tactics and social engineering scams to wrest credentials from macOS users.
25 Nov 2025
Biztonsági szemle
With Friends Like These: China Spies on Russian IT Orgs
State-linked hackers stayed under the radar by using a variety of commercial cloud services for command-and-control communications.
25 Nov 2025
Biztonsági szemle
As Gen Z Enters Cybersecurity, Jury Is Out on AI's Impact
Despite possibly supplanting some young analysts, one Gen Z cybersecurity specialist sees AI helping teach those willing to learn and removing drudge work.
25 Nov 2025
Biztonsági szemle
'JackFix' Attack Circumvents ClickFix Mitigations
A new ClickFix variant ratchets up the psychological pressure to 100 and addresses some technical mitigations to classic ClickFix attacks.
24 Nov 2025
Biztonsági szemle
ShadowRay 2.0 Turns AI Clusters into Crypto Botnets
A threat actor is leveraging a flaw in the Ray framework to hijack AI infrastructure worldwide and distribute a self-propagating cryptomining and data theft botnet.
24 Nov 2025
Biztonsági szemle
Critical Flaw in Oracle Identity Manager Under Exploitation
The exploitation of CVE-2025-61757 follows a breach of Oracle Cloud earlier this year as well as a recent extortion campaign targeting Oracle E-Business Suite customers.
24 Nov 2025
Biztonsági szemle
Infamous Shai-hulud Worm Resurfaces From the Depths
This campaign introduces a new variant that executes malicious code during preinstall, significantly increasing potential exposure in build and runtime environments, researchers said.
24 Nov 2025
Biztonsági szemle
Vision Language Models Keep an Eye on Physical Security
Advancements in vision language models expanded models reasoning capabilities to help protect employee safety.
21 Nov 2025
Biztonsági szemle
Deja Vu: Salesforce Customers Hacked Again, Via Gainsight
In a repeat of similar attacks during the summer, threat actors affiliated with the ShinyHunters extortion group used a third-party application to steal organizations' Salesforce data.
Pagination
- Previous page ‹‹
- Page 8
- Next page ››