Skip to main content
Main navigation
About us
HunCERT group
Statute
Current
News
Events
DNS4EU
Alerts
For providers
Security bulletin
Knowledge base
HunCERT PROBE
Communication exercise
For individuals
Security bulletin
Knowledge base
Glossary
FAQ
Toggle theme
Light
Dark
Auto
Magyar
Report incident
Home
For individuals
29 May 2025
Riasztás
CVE-2025-30377 - Microsoft Office Remote Code Execution sebezhetősége
nki.gov.hu
Read more
29 May 2025
Riasztás
CVE-2025-33072 - Microsoft msagsfeedback.azurewebsites.net Information Disclosure sebezhetősége
nki.gov.hu
Read more
29 May 2025
Biztonsági szemle
Certified Randomness Uses Quantum Cryptography to Make Stronger Keys
Researchers are using quantum computers to generate keys that are truly random to strengthen data encryption.
darkreading.com
Read more
29 May 2025
Biztonsági szemle
ASUS router backdoors affect 9K devices, persist after firmware updates
Authentication bypass and command injection flaws facilitate the malicious activity.
scmagazine.com
Read more
28 May 2025
Biztonsági szemle
Hundreds of Web Apps Have Full Access to Microsoft OneDrive Files
Researchers at Oasis Security say the problem has to do with OneDrive File Picker having overly broad permissions.
darkreading.com
Read more
28 May 2025
Biztonsági szemle
AT&T Dynamic Defense: Reinventing Cybersecurity at the Network Edge - Senthil Ramakrishnan - SCA25 #1
scmagazine.com
Read more
28 May 2025
Biztonsági szemle
CISA Issues SOAR, SIEM Implementation Guidance
Among the recommendations, organizations should conduct thorough testing and manage costs, which can be hefty, before implementing the platforms.
darkreading.com
Read more
28 May 2025
Biztonsági szemle
Enterprise security risk increases as transition to IAM platforms lag
Fewer than 4% of enterprise security teams have fully automated their core identity workflows, according to Cerby.
scmagazine.com
Read more
28 May 2025
Biztonsági szemle
Cisco launches new identity access management products, services
Duo Identity and Access Management (IAM) claims to work in conjunction with existing capabilities.
scmagazine.com
Read more
28 May 2025
Biztonsági szemle
Implementing Secure by Design Principles for AI
Harnessing AI's full transformative potential safely and securely requires more than an incremental enhancement of existing cybersecurity practices. A Secure by Design approach represents the best path forward.
darkreading.com
Read more
Search
Language
Hungarian
(1098)
English
(39679)
Type
Article
(2)
Fogalom
(78)
Tudástár
(18)
Presentation
(2)
Biztonsági szemle
(11038)
Search
Pagination
« First
First page
‹ Previous
Previous page
…
735
736
737
738
739
740
741
742
743
…
Next ›
Next page
Last »
Last page