Security Bulletin

7 May 2025
Biztonsági szemle
Over $167M to be paid by NSO Group to WhatsApp over spyware hack
Such a jury ruling, which is set to be appealed by NSO Group, was hailed by WhatsApp to be "the first victory" against illegal spyware development and usage.

7 May 2025
Biztonsági szemle
Trump's Defense Department cyber policy nominee pledges to bolster cyber threat deterrence
Katie Sutton, who was nominated by President Donald Trump to become assistant secretary of defense for cyber policy, has committed to strengthening the U.S.'s cyber threat deterrence strategy by combining "denial, resilience, and credible responses"...

7 May 2025
Biztonsági szemle
Infrastructure as Code: An IaC Guide to Cloud Security
IaC is powerful. It brings speed, scale, and structure to cloud infrastructure. But none of that matters if your security can't keep up.

7 May 2025
Biztonsági szemle
Building Families: How Cisco’s Supportive Policies Made My Motherhood Possible
Communications Manager Amanda W. shares her journey to motherhood, and how Cisco's support, flexibility, and benefits made her dream of growing her family possible.
7 May 2025
Biztonsági szemle
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-6047 GeoVision Devices OS Command Injection Vulnerability CVE-2024-11120 GeoVision Devices OS Command Injection...

7 May 2025
Biztonsági szemle
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394

7 May 2025
Biztonsági szemle
Cisco Study Reveals Alarming Deficiencies in European Cybersecurity Readiness
AI is reshaping the world, introducing cyber risks of a magnitude never before encountered. Cisco’s report highlights the critical gaps in Europe's security readiness in the AI era.

7 May 2025
Biztonsági szemle
Example of "Modular" Malware, (Wed, May 7th)
Developers (of malware as well as goodware) don't have to reinvent the wheel all the time. Why rewrite a piece of code that was development by someone else? In the same way, all operating systems provide API calls (or system calls) to...

7 May 2025
Biztonsági szemle
ISC Stormcast For Wednesday, May 7th, 2025 https://isc.sans.edu/podcastdetail/9440, (Wed, May 7th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

7 May 2025
Biztonsági szemle
Five Reasons Why Network Security Training Should Be Your Next Move
Network security training could be your ticket to a high-paying, in-demand career. Find out why and how you can start learning today for free.

7 May 2025
Biztonsági szemle
Massive cybercrime operation traced back to Myanmar warlord
Warlord believed to be using control over the Karen region as a hub for fraud and cybercrime activities.

6 May 2025
Biztonsági szemle
Mamona ransomware lowers the bar with offline encryption
Simplistic “commodity” ransomware makes it easy to launch low-skill attacks.
Pagination
- Previous page ‹‹
- Page 102
- Next page ››