Security Bulletin

21 Aug 2025
Biztonsági szemle
Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
By using brief, plain clues in their prompts that are likely to influence the app to query older models, a user can downgrade ChatGPT for malicious ends.

21 Aug 2025
Biztonsági szemle
How Architectural Controls Help Can Fill the AI Security Gap
NCC Group's David Brauchler III shared how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional guardrails can't.

21 Aug 2025
Biztonsági szemle
Hackers Abuse VPS Infrastructure for Stealth, Speed
New research highlights how threat actors abuse legitimate virtual private server offerings in order to spin up infrastructure cheaply, quietly, and fast.

21 Aug 2025
Biztonsági szemle
K-12 School Incident Response Plans Fall Short
Quick recovery relies on three security measures.

21 Aug 2025
Biztonsági szemle
The power of ten — and the power of Purpose
With ten days off to volunteer through our Time2Give program, $10,000 in matching donations, and tens of thousands employees participating, Cisconians are empowered to turn Purpose into action. See our impact in FY25, and what's ahead for FY26.

21 Aug 2025
Biztonsági szemle
Tree of AST: A Bug-Hunting Framework Powered by LLMs
Teenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitations of the past.

21 Aug 2025
Biztonsági szemle
Prepping the Front Line for MFA Social Engineering Attacks
Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets.

21 Aug 2025
Biztonsági szemle
Tailing Hackers, Columbia University Uses Logging to Improve Security
Logging netflows provided valuable insight about attacker tactics during a breach by state-sponsored hackers targeting Columbia's research labs.

21 Aug 2025
Biztonsági szemle
DARPA: Closing the Open Source Security Gap With AI
DARPA's Kathleen Fisher discusses the AI Cyber Challenge at DEF CON 33, and the results that proved how automation can help patch vulnerabilities at scale.

21 Aug 2025
Biztonsági szemle
Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
A lot of people like the command line, the CLI, the shell (name it as you want) because it provides a lot of powerful tools to perform investigations. The best example is probably parsing logs! Even if we have SIEM to ingest and process them, many...

21 Aug 2025
Biztonsági szemle
Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail
At one point, Al-Tahery Al-Mashriky was hacking thousands of websites within the span of three months while stealing personal data and sensitive information.

21 Aug 2025
Biztonsági szemle
ISC Stormcast For Thursday, August 21st, 2025 https://isc.sans.edu/podcastdetail/9580, (Thu, Aug 21st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Pagination
- Previous page ‹‹
- Page 14
- Next page ››