Security Bulletin

6 Aug 2026
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.

18 Sep 2025
Biztonsági szemle
Exploring Uploads in a Dshield Honeypot Environment [Guest Diary], (Thu, Sep 18th)
[This is a Guest Diary by Nathan Smisson, an ISC intern as part of the SANS.edu BACS program]

17 Sep 2025
Biztonsági szemle
Microsoft Disrupts 'RaccoonO365' Phishing Service
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime.

17 Sep 2025
Biztonsági szemle
'Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree
Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual.

17 Sep 2025
Biztonsági szemle
Composable Infrastructure: What It Means in the AI Era
AI is reshaping infrastructure demands—and traditional infrastructure can’t keep up. Discover how Cisco UCS X-Series with X-Fabric Technology 2.0 delivers true composability, unlocking scalable, GPU-accelerated performance for the AI era.

17 Sep 2025
Biztonsági szemle
Fusing Security into Networks: The Next Evolution in Enterprise Protection
Today’s networks are dynamic, distributed, and constantly under attack—making traditional, bolt-on security tools insufficient. Cisco® AI-Ready Secure Network Architecture embeds multilayered secu… Read more on Cisco Blogs

17 Sep 2025
Biztonsági szemle
AI-Powered Sign-up Fraud Is Scaling Fast
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.

17 Sep 2025
Biztonsági szemle
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.

17 Sep 2025
Biztonsági szemle
CTRL-Z DLL Hooking, (Wed, Sep 17th)
When you're debugging a malware sample, you probably run it into a debugger and define some breakpoints. The idea is to take over the program control before it will perform âinterestingâ actions. Usually, we set breakpoints on memory...

17 Sep 2025
Biztonsági szemle
ISC Stormcast For Wednesday, September 17th, 2025 https://isc.sans.edu/podcastdetail/9616, (Wed, Sep 17th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

17 Sep 2025
Biztonsági szemle
North Korean Group Targets South With Military ID Deepfakes
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.
Pagination
- Page 1
- Next page ››