Security Bulletin

13 May 2025
Biztonsági szemle
What Does EU's Bug Database Mean for Vulnerability Tracking?
The EU cyber agency ENISA has launched its vulnerability database, the EUVD; security experts shared their thoughts regarding what this means for CVEs, as well as the larger conversation around how bugs are tracked.

13 May 2025
Biztonsági szemle
TeleMessage Signal app lands on CISA's exploited vulnerability list
CISA responded to concerns that the flaw potentially lets attackers access entire message histories from Signal clones.

13 May 2025
Biztonsági szemle
CISA Warns of TeleMessage Vuln Despite Low CVSS Score
Though the app claims to use end-to-end encryption, hackers have reportedly accessed archived data on the app's servers via a new vulnerability.

13 May 2025
Biztonsági szemle
Think your cloud is secure? Three common misconfigurations you’re probably overlooking
Cloud security isn’t just about firewalls and permissions. Hidden missteps in your network architecture could be opening the door to costly breaches. Here are three oversights that full mesh SASE architecture helps eliminate.

13 May 2025
Biztonsági szemle
Your cloud is only as strong as its weakest link: How full mesh SASE closes hidden security gaps
Cloud adoption has transformed how businesses operate—but it’s also introduced new risks. From fragmented connectivity to poor visibility, traditional network architectures are full of blind spots. Harmony SASE’s full mesh design offers a smarter...

13 May 2025
Biztonsági szemle
The hidden costs of legacy security stacks—and how to reclaim your budget
How to identify hidden costs and unlock new value through modern, cloud-based security strategies.

13 May 2025
Biztonsági szemle
CIOs grapple with budget pressures: New playbook offers fresh take on network security ROI
With security budgets under strain and complexity on the rise, CIOs are rethinking how they measure the true cost—and value—of network protection.

13 May 2025
Biztonsági szemle
DeepSeek, Deep Research Mean Deep Changes for AI Security
Why securing the inference chain is now the top priority for AI applications and infrastructure.

13 May 2025
Biztonsági szemle
Mainframe security: Identifying threats, vulnerabilities and risk mitigation strategies
Experts discuss the critical importance of proactive mainframe security, emphasizing education, regular assessments, and comprehensive vulnerability management to protect mission-critical systems that power global financial transactions.

13 May 2025
Biztonsági szemle
Datadog raises forecast after Q1 revenue beat
Datadog reported $761.6 million in revenue for Q1 2025, a 25% year-over-year increase that beat analyst projections of $741.5 million.

13 May 2025
Biztonsági szemle
MFA circumvented through legacy login flaw
Cybersecurity firm Guardz reported that between March 18 and April 7, 2025, attackers used the outdated BAV2ROPC protocol, which bypasses MFA and modern protections by enabling non-interactive logins through basic credentials.

13 May 2025
Biztonsági szemle
GSA launches FedRAMP 20-X to speed up cloud approvals
Travis Howerton, former federal CTO and CEO of Redscale, explained that the update shifts more responsibility to cloud service providers by automating evidence sharing and control reporting, reducing manual oversight and paperwork.
Pagination
- Previous page ‹‹
- Page 73
- Next page ››