Security Bulletin

4 Aug 2025
Biztonsági szemle
CISA & FEMA Announce $100M+ in Community Cybersecurity Grants
The grants are intended to help states, tribes, and localities enhance their cybersecurity resilience by providing them with monetary resources to reduce risks and implement new procedures.

4 Aug 2025
Biztonsági szemle
MacOS Under Attack: How Organizations Can Counter Rising Threats
Not only are attacks against macOS users ramping up, but threat actors have proved to be advanced with deepfake technology. Security awareness training may be the best defense.

4 Aug 2025
Biztonsági szemle
Threat Actors Increasingly Leaning on GenAI Tools
From "eCrime" actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations.

4 Aug 2025
Biztonsági szemle
42% of Developers Using AI Say Their Codebase is Now Mostly AI-Generated

4 Aug 2025
Biztonsági szemle
New Feature: Daily Trends Report, (Mon, Aug 4th)
I implemented a new report today, the "Daily Trends" report. It summarizes noteworthy data received from our honeypot. As with everything, it will improve if you provide feedback :)

4 Aug 2025
Biztonsági szemle
How Nestlé Revamped Its Network for Resilience and Efficiency
Learn how updating to Cisco SD-WAN, Cisco ThousandEyes, and Cisco Secure Routers helped Nestlé manage its global network with greater efficiency and resilience.

4 Aug 2025
Biztonsági szemle
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation.

4 Aug 2025
Biztonsági szemle
Turning Human Vulnerability Into Organizational Strength
Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and the deployment of layered technical controls.

4 Aug 2025
Biztonsági szemle
ISC Stormcast For Monday, August 4th, 2025 https://isc.sans.edu/podcastdetail/9554, (Mon, Aug 4th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

3 Aug 2025
Biztonsági szemle
Legacy May Kill, (Sun, Aug 3rd)
Just saw something that I thought was long gone. The username "pop3user" is showing up in our telnet/ssh logs. I don't know how long ago it was that I used POP3 to retrieve e-mail from one of my mail servers. IMAP and various webmail systems...

2 Aug 2025
Biztonsági szemle
What Is the Role of Provable Randomness in Cybersecurity?
Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it's equally important to examine the randomness underpinning them
Pagination
- Previous page ‹‹
- Page 30
- Next page ››