Security Bulletin

20 Aug 2025
Biztonsági szemle
System Shocks? EV Smart Charging Tech Poses Cyber-Risks
Trend Micro's Salvatore Gariuolo talks with the Black Hat USA 2025 News Desk about how the new ISO 15118 standard for electric vehicle smart charging and vehicle-to-grid communications can be weaponized by threat actors.

20 Aug 2025
Biztonsági szemle
How Warlock Ransomware Targets Vulnerable SharePoint Servers
Researchers highlight how Warlock, a new ransomware heavyweight, uses its sophisticated capabilities to target on-premises SharePoint instances.

20 Aug 2025
Biztonsági szemle
Cybercriminals Abuse Vibe Coding Service to Create Malicious Sites
Some LLM-created scripts and emails can lower the barrier of entry for low-skill attackers, who can use services like Lovable to create convincing, effective websites in minutes.

20 Aug 2025
Biztonsági szemle
Why Video Game Anti-Cheat Systems Are a Cybersecurity Goldmine
Sam Collins and Marius Muench of the University of Birmingham, UK, join the Black Hat USA 2025 News Desk to explain how anti-cheat systems in video games provide valuable lessons on defending against threat actors' techniques and strategies.

20 Aug 2025
Biztonsági szemle
FBI, Cisco Warn of Russian Attacks on 7-Year-Old Flaw
In the past year, "Static Tundra," aka "Energetic Bear," has breached thousands of end-of-life Cisco devices unpatched against a 2018 flaw, in a campaign targeting enterprises and critical infrastructure.

20 Aug 2025
Biztonsági szemle
Side of Fries With That Bug? Hacker Finds Flaws in McDonald's Staff, Partner Hubs
Exposure of APIs, sensitive data, and corporate documents are just some of the security issues that the purveyor of Big Macs was cooking up.

20 Aug 2025
Biztonsági szemle
How Outer Space Became the Next Big Attack Surface
VisionSpace Technologies' Andrzej Olchawa and Milenko Starcik discussed a set of vulnerabilities capable of ending space missions at the Black Hat USA 2025 News Desk.

20 Aug 2025
Biztonsági szemle
Incode Acquires AuthenticID to Enhance AI-Driven Identity Verification
The combination of Incode's AI models and AuthenticID's experience running identity programs at scale in regulated environments will provide customers with holistic fraud signal analysis, multi-modal intelligence, real-time personhood verification...

20 Aug 2025
Biztonsági szemle
Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)
Looking at new usernames collected by our Cowrie honeypots, you will first of all notice a number of HTTP headers. It is very common for attackers to scan for web servers on ports that are covered by our Telnet honeypots. The result is that HTTP...

20 Aug 2025
Biztonsági szemle
Europe's Ransomware Surge Is a Warning Shot for US Defenders
We can strip attackers of their power by implementing layered defenses, ruthless patch management, and incident response that assumes failure and prioritizes transparency.

20 Aug 2025
Biztonsági szemle
ISC Stormcast For Wednesday, August 20th, 2025 https://isc.sans.edu/podcastdetail/9578, (Wed, Aug 20th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

20 Aug 2025
Biztonsági szemle
Asian Orgs Shift Cybersecurity Requirements to Suppliers
The uptick in breaches in Asia has prompted a Japanese chipmaker and the Singaporean government to require vendors to pass cybersecurity checks to do business.
Pagination
- Previous page ‹‹
- Page 16
- Next page ››