Security Bulletin

2 Jan 2025
Biztonsági szemle
Volkswagen Breach Exposes Data of 800K EV Customers
Ethical hacking group Chaos Computer Club uncovered exposed data of electrical vehicle owners across the company's VW, Audi, Seat, and Skoda brands.

2 Jan 2025
Biztonsági szemle
Goodware Hash Sets, (Thu, Jan 2nd)
In the cybersecurity landscape, we all need hashes! A hash is the result of applying a special mathematical function (a âhash functionâ) that transforms an input (such as a file or a piece of text) into a fixed-size string or number. This output...

2 Jan 2025
Biztonsági szemle
Cybersecurity regulations in 2025: Key insights from top industry experts
New regulations in the EU come online early in 2025, while state governments are expected to crack down on AI, security pros say.

2 Jan 2025
Biztonsági szemle
Chinese cyberattacks escalated in 2024
Chinese state-sponsored threat operation Volt Typhoon, also known as Vanguard Panda, was regarded by CrowdStrike Senior Vice President of Counter Adversary Operations Adam Meyers to be among the more concerning China-linked threats after pre...

2 Jan 2025
Biztonsági szemle
Ford confirms X account hack
Ford Motor Company has disclosed having its account on X, formerly Twitter, breached following posts expressing pro-Palestine and anti-Israel sentiment on Monday.

2 Jan 2025
Biztonsági szemle
MetLife denies RansomHub claims of breach
Cybernews reports that MetLife was claimed to have been compromised by the RansomHub ransomware-as-a-service operation, which alleged the theft of 1 TB of data from the major global insurance company's systems. The insurance company, however, denied...

2 Jan 2025
Biztonsági szemle
Fraudulent rating-boosting stars prevalent in GitHub
Over 15,800 GitHub repositories have been given 3.1 million inauthentic stars meant to bolster their legitimacy and reach, with almost 16% of repositories awarded 50 stars in July leveraged in malicious campaigns.

2 Jan 2025
Biztonsági szemle
Azure compromise possible with Apache Airflow vulnerabilities
After facilitating initial access through the creation and uploading of a directed acrylic graph file to GitHub that enabled reverse shell deployment, threat actors could proceed to exploit the Kubernetes misconfiguration to achieve cluster takeovers...

2 Jan 2025
Biztonsági szemle
Clickjacking protections evaded by novel exploit
Attacks using DoubleClickJacking commence with visits to a malicious site redirecting to a new tab or window without any user interaction, which will be followed by a CAPTCHA verification triggering a double-click that prompts the exploitation of the...

2 Jan 2025
Biztonsági szemle
'Bad Likert Judge' Jailbreak Bypasses Guardrails of OpenAI, Other Top LLMs
A novel technique to stump artificial intelligence (AI) text-based systems increases the likelihood of a successful cyberattack by 60%.

2 Jan 2025
Biztonsági szemle
AWS leveraged in EC2 Grouper attacks
After obtaining credentials from code repositories, EC2 Grouper utilizes PowerShell and other AWS tools to initiate compromise before exploiting APIs to enable reconnaissance and resource provisioning, as well as establish unique security groups...

2 Jan 2025
Biztonsági szemle
More details on widespread Chrome extension compromise emerge
While Google Groups and LinkedIn reports noted the campaign to have commenced in early December, such an attack may have been tested since March as evidenced by command-and-control subdomains discovered by BleepingComputer.
Pagination
- Previous page ‹‹
- Page 312
- Next page ››