Security Bulletin
4 Aug 2025
Biztonsági szemle
42% of Developers Using AI Say Their Codebase is Now Mostly AI-Generated
4 Aug 2025
Biztonsági szemle
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation.
4 Aug 2025
Biztonsági szemle
Turning Human Vulnerability Into Organizational Strength
Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and the deployment of layered technical controls.
2 Aug 2025
Biztonsági szemle
What Is the Role of Provable Randomness in Cybersecurity?
Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it's equally important to examine the randomness underpinning them
1 Aug 2025
Biztonsági szemle
Dark Reading News Desk Turns 10, Back at Black Hat USA for 2025
Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required.
1 Aug 2025
Biztonsági szemle
LLMs' AI-Generated Code Remains Wildly Insecure
Security debt ahoy: only about half of the code that the latest large language models (LLMs) create is cybersecure, and more and more of it is being created all the time.
1 Aug 2025
Biztonsági szemle
Male-Dominated Cyber Industry Still Holds Space for Women With Resilience
When trying to crack your way into a cyber career, true passion and a bold love of the industry is a must, if you want to set yourself apart from hundreds of other job applicants, according to Weave CISO Jessica Sica.
1 Aug 2025
Biztonsági szemle
Building the Perfect Post-Security Incident Review Playbook
By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience.
1 Aug 2025
Biztonsági szemle
New 'Shade BIOS' Technique Beats Every Kind of Security
What if malware didn't require an operating system to function? How would anyone possibly notice, let alone disable it?
1 Aug 2025
Biztonsági szemle
ISC2 Launches New Security Certificate for AI Expertise
ISC2 is launching a 6-course certificate program to address the growing demand for AI security expertise. Courses cover topics such as AI fundamentals, ethics, and risks.
1 Aug 2025
Biztonsági szemle
SIEMs: Dying a Slow Death or Poised for AI Rebirth?
The SIEM market is at a pivotal point as XDR platforms and generative AI shake up the security analytics space.
31 Jul 2025
Biztonsági szemle
CISA Releases Free Thorium Malware Analysis Tool
Thorium enhances cybersecurity teams' defense capabilities by seamlessly integrating commercial, open-source, and custom tools used to analyze malware.
Pagination
- Previous page ‹‹
- Page 91
- Next page ››