Skip to main content
Main navigation
About us
HunCERT group
Statute
Current
News
Events
DNS4EU
Alerts
For providers
Security bulletin
Knowledge base
HunCERT PROBE
Communication exercise
For individuals
Security bulletin
Knowledge base
Glossary
FAQ
Toggle theme
Light
Dark
Auto
Magyar
Report incident
Home
For individuals
6 Feb 2025
Riasztás
Medium - CVE-2025-21283 - Microsoft Edge (Chromium-based) Remote Code...
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
security-database.com
Read more
6 Feb 2025
Riasztás
High - CVE-2025-21342 - Microsoft Edge (Chromium-based) Remote Code...
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
security-database.com
Read more
6 Feb 2025
Riasztás
Medium - CVE-2025-21404 - Microsoft Edge (Chromium-based) Spoofing...
Microsoft Edge (Chromium-based) Spoofing Vulnerability
security-database.com
Read more
6 Feb 2025
Riasztás
High - CVE-2025-21408 - Microsoft Edge (Chromium-based) Remote Code...
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
security-database.com
Read more
5 Feb 2025
Biztonsági szemle
Ransomware payments drop 35% in 2024, first decrease since 2022
The first half of 2024 recorded an increase in ransomware payouts.
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
C-Suite Cybersecurity Responsibilities, Humble Leaders, and Effective Communication - BSW #381
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
Veeam Updater receives update for critical RCE flaw
The vulnerability affects Veeam Backup for Salesforce, AWS, Microsoft Azure, Google Cloud and more.
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
Infostealers targeting macOS jumped by 101% in second half of 2024
While infostealers are often seen as less dangerous compared with trojans, they can exfiltrate sensitive data, leading to data breaches.
scmagazine.com
Read more
5 Feb 2025
Biztonsági szemle
Abandoned AWS Cloud Storage: A Major Cyberattack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
darkreading.com
Read more
5 Feb 2025
Biztonsági szemle
Build a vulnerability management program with internet exposure in mind
Teams need to adapt their vulnerability management programs to the reality that most of their business today runs on the internet.
scmagazine.com
Read more
Search
Language
Hungarian
(1172)
English
(39828)
Type
Article
(2)
Fogalom
(78)
Tudástár
(18)
Presentation
(8)
Biztonsági szemle
(11194)
Search
Pagination
« First
First page
‹ Previous
Previous page
…
1537
1538
1539
1540
1541
1542
1543
1544
1545
…
Next ›
Next page
Last »
Last page