Security Bulletin

3 Feb 2025
Biztonsági szemle
Semgrep non-drama, Facebook hates Linux - Vulns in Cars, Cell Towers, M365, and more - ESW #392

3 Feb 2025
Biztonsági szemle
Microsoft Sets End Date for Defender VPN
Though Windows, iOS, and macOS users won't need to make any changes, Android users are advised to remove their Defender VPN profiles.

3 Feb 2025
Biztonsági szemle
AI Malware Dressed Up as DeepSeek Packages Lurk in PyPi
Adversaries looking to ride the DeepSeek interest wave are taking advantage of developers in a rush to deploy the new technology, by using AI-generated malware against them.

3 Feb 2025
Biztonsági szemle
Ransomware Groups Weathered Raids, Profited in 2024
Cybercriminals posted nearly 6,000 breaches to data-leak sites last year — and despite significant takedowns, they continued to thrive in a record-breaking year for ransomware.

3 Feb 2025
Biztonsági szemle
New identity challenges demand new security tools
The importance of identity security has become painfully apparent for security professionals as threat actors focus on phishing and other identity-based attacks to penetrate networks.

3 Feb 2025
Biztonsági szemle
Why Cybersecurity Needs Probability — Not Predictions
While probabilities may be based on subjective information, when used in an objective framework, they demonstrate an effective way to improve the value of hard decisions.

3 Feb 2025
Biztonsági szemle
DOJ, Dutch police take down group selling phishing tools to cybercriminals
DOJ says the joint action with the Dutch National Police took down 39 domains of the Pakistani group Saim Raza.

3 Feb 2025
Biztonsági szemle
Six AI Predictions For 2025 That Will Reshape How We Think About Enterprise Technology
Explore the 2025 technology landscape: precision AI, data security, sustainability, and partner ecosystems driving success. Discover how strategic collaboration and re-skilling will transform enterprise innovation and deliver tangible business value.

3 Feb 2025
Biztonsági szemle
How AI can revolutionize vulnerability research
AI agents and GenAI-driven fuzzing tools are already discovering flaws in open-source software.

3 Feb 2025
Biztonsági szemle
New PyPI project archiving system aims to curb open-source security risks
While the archived projects remain available for download, users will be provided a warning banner to help them make informed dependency choices. PyPI aims to enhance supply-chain security by preventing attackers from hijacking abandoned projects and...

3 Feb 2025
Biztonsági szemle
Italy moves to ban DeepSeek amid data privacy concerns
Hangzhou DeepSeek Artificial Intelligence and Beijing DeepSeek Artificial Intelligence, which support the chatbot service, have been sought by Garante to provide details not only on the types of gathered personal information, used sources, and server...

3 Feb 2025
Biztonsági szemle
DeepSeek, other Chinese apps prohibited in Texas government devices
Chinese-owned social media apps Xiaohongshu, also known as RedNote, and Lemon8 — both of which gained traction across the U.S. ahead of the temporary TikTok ban last month — have also been restricted in all devices provided by the Texas state...
Pagination
- Previous page ‹‹
- Page 273
- Next page ››