Security Bulletin

20 Aug 2025
Biztonsági szemle
Wrangling the Wild West of MCP Servers
Take an AI break and learn how to build a Model Context Protocol (MCP) server.

19 Aug 2025
Biztonsági szemle
Russian Hacktivists Take Aim at Polish Power Plant, Again
This attack was seemingly more successful than the first iteration, causing disruptions at the plant.

19 Aug 2025
Biztonsági szemle
Agentic AI, Apple Intelligence, EV Chargers: Everyday Cybersecurity Peril Abounds for Businesses
Cybersecurity risks can come from everywhere, as these riveting Dark Reading News Desk videos detail. Check out Part 1 of our broadcast coverage of the top research presented at Black Hat USA 2025.

19 Aug 2025
Biztonsági szemle
How to Vibe Code With Security in Mind
As more organizations integrate vibe coding and AI-assisted coding into their application development processes, it's important to remember to put security first.

19 Aug 2025
Biztonsági szemle
'RingReaper' Sneaks Right Past Linux EDRs
The highly sophisticated post-compromise tool abuses the Linux kernel's io_uring interface to remain hidden from endpoint detection and response systems.

19 Aug 2025
Biztonsági szemle
AI Agents Access Everything, Fall to Zero-Click Exploit
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "grown arms and legs" —and what that means for cyber risk.

19 Aug 2025
Biztonsági szemle
Millions Allegedly Affected in Allianz Insurance Breach
Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers.

19 Aug 2025
Biztonsági szemle
Increased Elasticsearch Recognizance Scans, (Tue, Aug 19th)
I noticed an increase in scans that appear to try to identify Elasticsearch instances. Elasticsearch is not a new target. Its ability to easily store and manage JSON data, combined with a simple HTTP API, makes it a convenient tool to store data that...

19 Aug 2025
Biztonsági szemle
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
Attackers are wielding the sophisticated modular malware while exploiting CVE-2025-29824, a previously zero-day flaw in Windows Common Log File System (CLFS) that allows attackers to gain system-level privileges on compromised systems.

19 Aug 2025
Biztonsági szemle
10 Major GitHub Risk Vectors Hidden in Plain Sight
By addressing these overlooked risk vectors, organizations can continue leveraging GitHub's innovation while protecting against sophisticated supply chain attacks targeting interconnected software.

19 Aug 2025
Biztonsági szemle
'DripDropper' Hackers Patch Their Own Exploit
An attacker is breaking into Linux systems via a widely abused 2-year-old vulnerability in Apache ActiveMQ, installing malware and then patching the flaw.

19 Aug 2025
Biztonsági szemle
Findings Report From the SOC at RSAC™ 2025 Conference
Cisco Security and Splunk protected RSAC™ 2025 Conference in the Security Operations Center. Learn about the latest innovations for the SOC of the Future.
Pagination
- Previous page ‹‹
- Page 17
- Next page ››