Security Bulletin
18 Dec 2025
Biztonsági szemle
2025 in Review: Strengthening Cybersecurity in EMEA with AI
Reflecting on a transformative year for cybersecurity in EMEA. Discover how AI, regulation, and talent development shaped our digital future in 2025.
18 Dec 2025
Biztonsági szemle
Dormant Iran APT is Still Alive, Spying on Dissidents
"Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication with its command-and-control server.
18 Dec 2025
Biztonsági szemle
Positive trends related to public IP ranges from the year 2025, (Thu, Dec 18th)
Since the end of the year is quickly approaching, it is undoubtedly a good time to look back at what the past twelve months have brought to us⦠And given that the entire cyber security profession is about protecting various systems from âbad...
18 Dec 2025
Biztonsági szemle
ISC Stormcast For Thursday, December 18th, 2025 https://isc.sans.edu/podcastdetail/9744, (Thu, Dec 18th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
17 Dec 2025
Biztonsági szemle
Critical Fortinet Flaws Under Active Attack
Attackers targeted admin accounts, and once authenticated, exported device configurations including hashed credentials and other sensitive information.
17 Dec 2025
Biztonsági szemle
In Cybersecurity, Claude Leaves Other LLMs in the Dust
Anthropic proves that LLMs can be fairly resistant to abuse. Most developers are either incapable of building safer tools, or unwilling to invest in doing so.
17 Dec 2025
Biztonsági szemle
'Cellik' Android RAT Leverages Google Play Store
The remote access Trojan lets an attacker remotely control a victim's phone and can generate malicious apps from inside the Play Store.
17 Dec 2025
Biztonsági szemle
Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity
The future of cybersecurity means defending everywhere. Securing IoT, cloud, and remote work requires a unified edge-to-cloud strategy. (First in a three-part series.)
17 Dec 2025
Biztonsági szemle
The Future of Quantum-Safe Networks Depends on Interoperable Standards
As quantum computing advances, secure, interoperable standards will be critical to making quantum key distribution (QKD) practical, trusted, and future-proof.
17 Dec 2025
Biztonsági szemle
Maybe a Little Bit More Interesting React2Shell Exploit, (Wed, Dec 17th)
I have already talked about various React2Shell exploit attempts we have observed in the last weeks. But new varieties of the exploit are popping up, and the most recent one is using this particular version of the exploit:
17 Dec 2025
Biztonsági szemle
Deck the halls with Webex calls: How Cisco technology brings holiday cheer to hospitals
Cisco’s Connected Santa program brings Christmas cheer to children in hospitals through the power of Webex and a team of dedicated Cisco volunteers. Discover the secrets behind the holiday magic.
17 Dec 2025
Biztonsági szemle
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customer environments.
Pagination
- Previous page ‹‹
- Page 42
- Next page ››