Skip to main content
Main navigation
About us
HunCERT group
Statute
Current
News
Events
HunCERT turns 20
DNS4EU
Alerts
For providers
Security bulletin
Knowledge base
HunCERT PROBE
Communication exercise
For individuals
Security bulletin
Knowledge base
Glossary
FAQ
Toggle theme
Light
Dark
Auto
Magyar
Report incident
Home
For individuals
6 Feb 2025
Riasztás
Medium - CVE-2025-21283 - Microsoft Edge (Chromium-based) Remote Code...
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
security-database.com
Read more
6 Feb 2025
Riasztás
High - CVE-2025-21342 - Microsoft Edge (Chromium-based) Remote Code...
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
security-database.com
Read more
6 Feb 2025
Riasztás
Medium - CVE-2025-21404 - Microsoft Edge (Chromium-based) Spoofing...
Microsoft Edge (Chromium-based) Spoofing Vulnerability
security-database.com
Read more
6 Feb 2025
Riasztás
High - CVE-2025-21408 - Microsoft Edge (Chromium-based) Remote Code...
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
security-database.com
Read more
5 Feb 2025
Biztonsági szemle
Ransomware payments drop 35% in 2024, first decrease since 2022
The first half of 2024 recorded an increase in ransomware payouts.
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
C-Suite Cybersecurity Responsibilities, Humble Leaders, and Effective Communication - BSW #381
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
Veeam Updater receives update for critical RCE flaw
The vulnerability affects Veeam Backup for Salesforce, AWS, Microsoft Azure, Google Cloud and more.
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
Infostealers targeting macOS jumped by 101% in second half of 2024
While infostealers are often seen as less dangerous compared with trojans, they can exfiltrate sensitive data, leading to data breaches.
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
Abandoned AWS Cloud Storage: A Major Cyberattack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
darkreading.com
Read more
5 Feb 2025
Biztonsági szemle
Build a vulnerability management program with internet exposure in mind
Teams need to adapt their vulnerability management programs to the reality that most of their business today runs on the internet.
scmagazine.com
Read more
Search
Language
Hungarian
(987)
English
(34863)
Type
Fogalom
(78)
Tudástár
(18)
Presentation
(2)
Biztonsági szemle
(10461)
Search
Pagination
« First
First page
‹ Previous
Previous page
…
1022
1023
1024
1025
1026
1027
1028
1029
1030
…
Next ›
Next page
Last »
Last page