Security Bulletin
![Closeup of an American "I voted" sticker placed on a navy shirt.](/sites/default/files/styles/narrow_1x/public/feeds/9f/051726_vote_sticker.jpg.webp?itok=rE2msZ35)
17 May 2024
Biztonsági szemle
Cybersecurity summit at Google tackles election threats
Cybersecurity experts convened at Google's Boulder, Colorado, campus to address election threats, particularly the challenges posed by advanced technologies like deepfakes, CBS News reports.
![AI, Artificial Intelligence](/sites/default/files/styles/narrow_1x/public/feeds/9a/0608_artificial_intelligence.jpg.webp?itok=v71DLEsH)
17 May 2024
Biztonsági szemle
Researchers: 'Adversarial attacks' capable of producing harmful AI responses
A study by Amazon Web Services researchers has revealed critical security vulnerabilities in large language models that understand and respond to speech, which could allow them to be manipulated into generating harmful responses using sophisticated...
![Wireless network and connection abstract data background with wifi symbol](/sites/default/files/styles/narrow_1x/public/feeds/06/051724_wifi.jpg.webp?itok=Ii3tKFhY)
17 May 2024
Biztonsági szemle
Downgrade attacks enabled by newly discovered Wi-Fi flaw
Security researchers have identified a design flaw in the IEEE 802.11 Wi-Fi standard that could allow malicious actors to trick users into connecting to less secure networks, The Hacker News reports.
![key on monitor screen, cybersecurity concept](/sites/default/files/styles/narrow_1x/public/feeds/a0/051324_ransomware.jpg.webp?itok=OF7mf0mg)
17 May 2024
Biztonsági szemle
Report: Cat-phishing of legitimate websites on the rise
HP's latest Wolf Security Threat Insights Report reveals that cybercriminals are employing "cat-phishing" techniques to deceive victims and using overdue invoice lures and Living-off-the-Land tactics to bypass security defenses, reports SiliconAngle.
![Computer keyboard, close-up button of the flag of North Korea.](/sites/default/files/styles/narrow_1x/public/feeds/6b/1127_north_korea-e1704488987937.jpg.webp?itok=fXobV-Uh)
17 May 2024
Biztonsági szemle
Human rights activists targeted in Kimsuky malware campaign
The North Korea-linked Kimsuky hacking group has launched a new social engineering campaign targeting activists in the North Korean human rights and anti-North Korea sectors, The Hacker News reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/f3/20240512-103432.png.webp?itok=UBsmQv_g)
17 May 2024
Biztonsági szemle
Another PDF Streams Example: Extracting JPEGs, (Fri, May 17th)
In my diary entry " Analyzing PDF Streams" I showed how to use my tools file-magic.py and myjson-filter.py together with my PDF analysis tool pdf-parser.py to analyze PDF streams en masse.
![](/sites/default/files/styles/narrow_1x/public/feeds/fb/Cisco-XDR_Evergreen_1200x600_Blog_Option-8.jpg.webp?itok=uXAWkgZV)
17 May 2024
Biztonsági szemle
Accessing Secure Client Cloud Management after the SecureX EoL
Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.
![](/sites/default/files/styles/narrow_1x/public/feeds/e3/microsoft_MAXSHOT.PL_shutterstock.jpg.webp?itok=hGDFzEi-)
17 May 2024
Biztonsági szemle
Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.
![10 software supply chain security tips](/sites/default/files/styles/narrow_1x/public/feeds/1b/051624_programming_code.jpg.webp?itok=U48cYQjP)
17 May 2024
Biztonsági szemle
Ten ways to minimize software supply chain risks
Organizations must make software supply chain security a collaborative effort where everyone on the development team gets involved.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
17 May 2024
Biztonsági szemle
Sajtószemle – 2024. 20. hét
A 2024. 20. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.05.10. és 2024.05.16. között kezelt incidensek statisztikai adatait is tartalmazza.
![](/sites/default/files/styles/narrow_1x/public/feeds/dd/talos-cyber-blog_1200x628_hero.jpg.webp?itok=x4R9arwG)
17 May 2024
Biztonsági szemle
Critical Steps to Bolster UK’s Cyber Resilience: Insights for Policy Makers from Cisco’s Cyber Readiness Index
In the face of growing cybersecurity threats, UK policymakers have intensified efforts to protect the nation's digital infrastructure. This blog looks at insights from the UK McPartland review and the interdependence between cyber security and...
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
17 May 2024
Biztonsági szemle
ISC Stormcast For Friday, May 17th, 2024 https://isc.sans.edu/podcastdetail/8986, (Fri, May 17th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Pagination
- Previous page ‹‹
- Page 144
- Next page ››