Security Bulletin

10 Jul 2025
Biztonsági szemle
ISC Stormcast For Thursday, July 10th, 2025 https://isc.sans.edu/podcastdetail/9520, (Thu, Jul 10th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

10 Jul 2025
Biztonsági szemle
North American APT Uses Exchange Zero-Day to Attack China
Stories about Chinese APTs attacking the US and Canada are plentiful. In a turnabout, researchers found what they believe is a North American entity attacking a Chinese entity, thanks to a mysterious issue in Microsoft Exchange.

10 Jul 2025
Biztonsági szemle
SSH Tunneling in Action: direct-tcp requests [Guest Diary], (Wed, Jul 9th)
[This is a Guest Diary by Sihui Neo, an ISC intern as part of the SANS.edu BACS program]

9 Jul 2025
Biztonsági szemle
Future-proofing education: Cisco and CIT partner to tackle today’s challenges and prepare tomorrow’s workforce
In the heart of Australia’s capital, the Canberra Institute of Technology (CIT) is setting an of how education can evolve to meet the challenges of today while preparing students for the opportunities of tomorrow. Through a bold commitment to digital...

9 Jul 2025
Biztonsági szemle
An NVIDIA Container Bug & Chance to Harden Kubernetes
A container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants.

9 Jul 2025
Biztonsági szemle
How Cisco Used Wyebot to Optimize the Wi-Fi Experience at Cisco Live 2025
At Cisco Live, Wyebot’s AI-powered sensors gave the Cisco team full visibility into attendee Wi-Fi experience, helping ensure flawless connectivity in one of the most demanding wireless environments.

9 Jul 2025
Biztonsági szemle
New AI Malware PoC Reliably Evades Microsoft Defender
Worried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tasks has yielded the capability to do just that.

9 Jul 2025
Biztonsági szemle
Rubio Impersonator Signals Growing Security Threat From Deepfakes
An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophistication of and national security threat posed by the AI technology.

9 Jul 2025
Biztonsági szemle
Setting up Your Own Certificate Authority for Development: Why and How., (Wed, Jul 9th)
There are several reasons why one would set up an internal certificate authority. Some are configured to support strong authentication schemes, some for additional flexibility and convenience. I am going to cover the second part. In particular, it...

9 Jul 2025
Biztonsági szemle
Know Your Enemy: Understanding Dark Market Dynamics
To help counter crime, today's organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal.

9 Jul 2025
Biztonsági szemle
SatanLock Next in Line for Ransomware Group Shutdowns
Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims.

9 Jul 2025
Biztonsági szemle
Unlock Security Operations Success With Data Analysis
From data fog to threat clarity: Automating security analytics helps security teams stop fighting phantoms and respond to what matters.
Pagination
- Page 1
- Next page ››