Security Bulletin
9 Feb 2026
Biztonsági szemle
Warlock Gang Breaches SmarterTools Via SmarterMail Bugs
The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product.
9 Feb 2026
Biztonsági szemle
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
9 Feb 2026
Biztonsági szemle
TeamPCP Turns Cloud Infrastructure into Crime Bots
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and interfaces.
9 Feb 2026
Biztonsági szemle
Black Basta Bundles BYOVD With Ransomware Payload
Researchers discovered a newly disclosed vulnerable driver embedded in Black Basta's ransomware, illustrating the increasing popularity of the defense-evasion technique.
9 Feb 2026
Biztonsági szemle
What Organizations Need to Change When Managing Printers
Ask the Expert: Organizations need to close the ownership vacuum, establish durable security controls, and ensure printers are protected as rigorously as other endpoints.
6 Feb 2026
Biztonsági szemle
'Encrypt It Already' Campaign Pushes Big Tech to Prioritize E2E Encryption
The Electronic Frontier Foundation is urging major technology companies to follow through on their promises to implement end-to-end encryption (E2E) by default across their services, as privacy concerns mount amid increased AI use.
6 Feb 2026
Biztonsági szemle
Shai-hulud: The Hidden Cost of Supply Chain Attacks
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to quantify.
6 Feb 2026
Biztonsági szemle
OpenClaw's Gregarious Insecurities Make Safe Usage Difficult
Malicious "skills" and persnickety configuration settings are just some of the issues that security researchers have found when installing — and removing — the OpenClaw AI assistant.
5 Feb 2026
Biztonsági szemle
EnCase Driver Weaponized as EDR Killers Persist
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed Windows to load it.
5 Feb 2026
Biztonsági szemle
Agentic AI Site 'Moltbook' Is Riddled With Security Risks
Someone used AI to build an entire Web platform, which then did something predictable and preventable: It exposed all its data through a publicly accessible API.
5 Feb 2026
Biztonsági szemle
Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful
A disconnect exists between an organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open source vulnerability frameworks to help security teams quickly assess which are important, based on...
5 Feb 2026
Biztonsági szemle
Cyber Success Trifecta: Education, Certifications & Experience
Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ingenuity in the face of AI-driven cybersecurity evolution.
Pagination
- Previous page ‹‹
- Page 8
- Next page ››