Security Bulletin
6 Aug 2026
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.
5 May 2026
Biztonsági szemle
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
19 Mar 2026
Biztonsági szemle
[Virtual Event] Shields Up: Key Technologies Reshaping Cybersecurity Defenses
4 Mar 2026
Biztonsági szemle
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here...
4 Mar 2026
Biztonsági szemle
IDC Insights: What’s Next for Intelligent Technical Support?
In its recent study sponsored by Cisco, IDC reveals the true differentiator in the AI era is intelligent support. Surbhi Kaul shares how Cisco IQ meets the moment.
4 Mar 2026
Biztonsági szemle
China's Silver Dragon Razes Governments in EU, SE Asia
The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyberespionage activities.
3 Mar 2026
Biztonsági szemle
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.
3 Mar 2026
Biztonsági szemle
Vehicle Tire Pressure Sensors Enable Silent Tracking
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.
3 Mar 2026
Biztonsági szemle
Qualcomm Zero-Day Exploited in Targeted Android Attacks
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
3 Mar 2026
Biztonsági szemle
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
Lessons from history highlight why AI-enabled browsers require controlled enablement.
3 Mar 2026
Biztonsági szemle
The Emerging Workload Security Threat, a Retrospective on VoidLink
Explore how VoidLink, a malware framework, targets Kubernetes and AI workloads. Discover why kernel-level runtime security is the new frontline.
Pagination
- Page 1
- Next page ››