Security Bulletin

13 Jun 2025
Biztonsági szemle
Data breach purportedly pilfers over 64M T-Mobile records
T-Mobile had 64 million records purportedly stolen from its systems exposed on a data leak site, Cybernews reports.

13 Jun 2025
Biztonsági szemle
AI moderation guardrails circumvented by novel TokenBreak attack
Malicious actors could exploit the novel TokenBreak attack technique to compromise large language models' tokenization strategy and evade implemented safety and content moderation protections, reports The Hacker News.

13 Jun 2025
Biztonsági szemle
Cyberattacks against public interest orgs spike, report finds
Cybersecurity threats, including distributed denial-of-service attacks and web exploits, against public interest organizations averted by Cloudflare's Project Galileo reached 108.9 billion between May 2024 and March 2025, which was 241% higher than...

13 Jun 2025
Biztonsági szemle
Zero-click attacks target journalists' iPhones with Graphite spyware
BleepingComputer reports that at least two journalists in Europe, including Italian Ciro Pellegrino, had their iPhones subjected to zero-click attacks exploiting the zero-day flaw, tracked as CVE-2025-43200, to deploy Paragon's Graphite spyware...

13 Jun 2025
Biztonsági szemle
New Predator spyware activity identified
New Predator spyware activity identified Intellexa's Predator spyware has reemerged with advanced obfuscation capabilities in multiple locations following public exposure and sanctions last year, reports CyberScoop.

13 Jun 2025
Biztonsági szemle
Cyberattacks on Humanitarian Orgs Jump Worldwide
These groups suffered three times the cyberattacks as the year previous, with DDoS attacks dominating and vulnerability scans and SQL injection also more common.

13 Jun 2025
Biztonsági szemle
Sajtószemle – 2025. 24. hét
A 2025. 24. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.06.06. és 2025.06.12. között kezelt incidensek statisztikai adatait is tartalmazza.

13 Jun 2025
Biztonsági szemle
ISC Stormcast For Friday, June 13th, 2025 https://isc.sans.edu/podcastdetail/9492, (Fri, Jun 13th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

13 Jun 2025
Biztonsági szemle
[Guest Diary] Anatomy of a Linux SSH Honeypot Attack: Detailed Analysis of Captured Malware, (Fri, Jun 13th)
[This is a Guest Diary by Michal Ambrozkiewicz, an ISC intern as part of the SANS.edu Bachelor&#39;s Degree in Applied Cybersecurity (BACS) program [1].]

13 Jun 2025
Biztonsági szemle
270K websites injected with ‘JSF-ck’ obfuscated code
The JavaScript obfuscation method produces working code using only six ASCII characters.

12 Jun 2025
Biztonsági szemle
Researchers Detail Zero-Click Copilot Exploit 'EchoLeak'
Researchers at Aim Security disclosed a Microsoft Copilot vulnerability of critical severity this week that could have enabled sensitive data exfiltration via prompt injection attacks.
Pagination
- Previous page ‹‹
- Page 32
- Next page ››