Security Bulletin

16 Jan 2025
Biztonsági szemle
First-Time Insights: NRF 2025 Experience
Innovation, sustainability, seamless customer experiences, and advanced technologies were key themes at NRF 2025. Here's how Cisco is empowering the retail industry to excel with AI integration, data insights, and cutting-edge connectivity solutions.

16 Jan 2025
Biztonsági szemle
FTC Orders GoDaddy to Fix Inadequate Security Practices
The FTC claims that the Web hosting company's security failures led to several major breaches in the past few years.

16 Jan 2025
Biztonsági szemle
4.2 million internet hosts hijacked via bugs in tunneling protocols
Attackers gain network access by targeting VPN servers, home, and enterprise routers.

16 Jan 2025
Biztonsági szemle
Strategic Approaches to Threat Detection, Investigation & Response
By staying vigilant, agile, and prepared, organizations can turn TDIR from a defensive strategy into a proactive enabler of security and operational excellence.

16 Jan 2025
Biztonsági szemle
Security researcher discovers critical vulnerability in Facebook ad platform
The flaw, which was linked to an unpatched issue in the Chrome browser integrated into Facebook’s ad infrastructure, could grant malicious actors control over the server.

16 Jan 2025
Biztonsági szemle
Pall Mall Process faces criticism over impact on commercial hacking tools
The Pall Mall Process, which was launched in 2023 by the British and French governments to address the proliferation of commercial cyber intrusion capabilities, has drawn criticism for its limited impact.

16 Jan 2025
Biztonsági szemle
Barcelona gaining reputation as spyware hub
Barcelona is becoming a magnet for spyware and cybersecurity firms, attracting companies with its favorable living conditions, tax benefits, and accessibility to the global market.

16 Jan 2025
Biztonsági szemle
Security risks exposed following hack of Apple’s USB-C controller
The ACE3 controller, which is an integral component to the management of charging and data transfer tasks in Apple devices, was compromised using reverse-engineering techniques to exploit weaknesses in its firmware and communication protocols.

16 Jan 2025
Biztonsági szemle
Transaction simulation spoofing attack targets cryptocurrency wallets
A new attack method dubbed transaction simulation spoofing has emerged as a significant threat to cryptocurrency users with its ability to let malicious actors exploit a key security feature in modern Web3 wallets.

16 Jan 2025
Biztonsági szemle
Risk, Reputational Scores Enjoy Mixed Success as Security Tools
Part predictive analysis, part intuition, risk and reputation services are imperfect instruments at best — and better than nothing for most organizations and insurers.

16 Jan 2025
Biztonsági szemle
Total student, teacher data theft reported from PowerSchool hack
All demographic information belonging to students and teachers dating back to a school district with almost 9,000 pupils' initial installation of PowerSchool have also been accessed as a result of the hack, according to a source close to the matter...

16 Jan 2025
Biztonsági szemle
Suspicious cyber activity addressed by University of Oklahoma amid Fog ransomware claims
Investigation into the incident is still underway, said a University of Oklahoma spokesperson, who also noted the implementation of additional network security measures.
Pagination
- Previous page ‹‹
- Page 295
- Next page ››