Security Bulletin
18 Jun 2025
Biztonsági szemle
CISOs warn of surge in AI-driven Cyber threats
Nearly all CISOs expect cyberattacks to intensify over the next three years, with artificial intelligence playing a growing role in both the sophistication and volume of threats, according to new global research by CSC, reports IT Brief Asia.
18 Jun 2025
Biztonsági szemle
Paddle faces $5M FTC fine over alleged tech support scam involvement
The U.S. Federal Trade Commission has ordered UK-based payment processor Paddle and its U.S. subsidiary to pay a $5 million penalty to resolve its alleged screening and fraud prevention lapses that allowed credit card system exploitation by tech...
18 Jun 2025
Biztonsági szemle
Report: Renewed terrorism insurance law should include federal cyber insurance backstop
Congress has been urged by Foundation for Defense of Democracies' Nick Leiserson to include a federal cyber insurance backstop upon the renewal of the Terrorism Risk Insurance Act, which is set to lapse in 2027, in a bid to bolster the cyber...
18 Jun 2025
Biztonsági szemle
AI hacking tools developed via commercial LLMs, report finds
Mistral AI's and xAI's commercial large language models Mixtral and Grok, respectively, have been leveraged to create various jailbroken artificial intelligence tools, or WormGPTs, peddled on cybercrime forums, reports CyberScoop.
18 Jun 2025
Biztonsági szemle
Mounting SEO poisoning attacks tied to Hacklink market
Hackread reports that underground market platform Hacklink has been fueling the increase in SEO poisoning attacks in Google Search results, which have been particularly targeted at the gambling sector.
18 Jun 2025
Biztonsági szemle
Cisco Live San Diego – that’s a wrap!
Stop by as Eric Knipp shares some takeaways from Cisco Live in San Diego.
18 Jun 2025
Biztonsági szemle
Serpentine#Cloud Uses Cloudflare Tunnels in Sneak Attacks
An unidentified threat actor is using .lnk Windows shortcut files in a series of sophisticated attacks utilizing in-memory code execution and living-off-the-land cyberattack strategies.
18 Jun 2025
Biztonsági szemle
CISO’s Toolkit: Understanding Core Cybersecurity Frameworks
Discover the top cybersecurity frameworks and best practices to build a resilient strategy, streamline compliance, and protect your organization from evolving threats.
18 Jun 2025
Biztonsági szemle
CISO Cyber Insurance Empowerment - Peter Hedberg, Stephan Jou, Morey Haber - BSW #400
18 Jun 2025
Biztonsági szemle
AI Is Scaling Fast, and So Must Our Networks and Policies
The readiness of digital infrastructure to meet AI’s demands will determine the ability of organizations and nations to innovate, compete, and thrive in the digital economy. This blog elaborates on the ‘ins’ and ‘outs’ for connectivity readiness and...
18 Jun 2025
Biztonsági szemle
Indian Car-Sharing Firm Zoomcar Latest to Suffer Breach
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails.
18 Jun 2025
Biztonsági szemle
Don?t Make it Easier than it Already is?..Default Passwords [Guest Diary], (Wed, Jun 18th)
[This is a Guest Diary by Matthew Paul, an ISC intern as part of the SANS.edu BACS program]
Pagination
- Previous page ‹‹
- Page 183
- Next page ››