Security Bulletin
28 Aug 2025
      
            Biztonsági szemle
      
  1,000+ Devs Lose Their Secrets to an AI-Powered Stealer
  One of the most sophisticated supply chain attacks to date caused immense amounts of data to leak to the Web in a matter of hours.
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  Dark Reading Confidential: A Guided Tour of Today's Dark Web
  Dark Reading Confidential Episode 9: Join us for a look around today's Dark Web, and find out how law enforcement, AI, nation-state activities, and more are reshaping the way cybercriminals conduct their dirty business online. Keith Jarvis, senior...
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  Ethical Hacking Challenge: Decode the Server Heist, Defend Your Digital Data
  Discover how SQL Injection attacks compromise databases and learn to protect against these threats.
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  CISA's New SBOM Guidelines Get Mixed Reviews
  Updated SBOM rules from CISA are a solid step toward making them more useful for cyber defenders but don't address many critical needs, experts say.
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  Increasing Searches for ZIP Files, (Thu, Aug 28th)
  I noticed recently that we have more and more requests for ZIP files in our web honeypot logs. Over the last year, we have had a substantial increase in these requests.
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  Uninterrupted Motion: Why Factories Need a New Class of Wireless
  Factories have been deploying AGVs and AMRs to increase productivity. Learn more about these vehicles and the wireless networks needed to connect them.
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  ISC Stormcast For Thursday, August 28th, 2025 https://isc.sans.edu/podcastdetail/9590, (Thu, Aug 28th)
  (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
      
            
      
  
28 Aug 2025
      
            Biztonsági szemle
      
  CrowdStrike to Acquire Onum, Boost Falcon Next-Gen SIEM
  This acquisition will bring Onum's real-time data pipeline to CrowdStrike's Falcon Next-Gen SIEM platform to deliver autonomous threat detection capabilities.
      
            
      
  
27 Aug 2025
      
            Biztonsági szemle
      
  Anthropic AI Used to Automate Data Extortion Campaign
  The company said the threat actor abused its Claude Code service to "an unprecedented degree," automating reconnaissance, intrusions, and credential harvesting.
      
            
      
  
27 Aug 2025
      
            Biztonsági szemle
      
  'ZipLine' Phishers Flip Script as Victims Email First
  "ZipLine" appears to be a sophisticated and carefully planned campaign that has already affected dozens of small, medium, and large organizations across multiple industry sectors.
      
            
      
  
27 Aug 2025
      
            Biztonsági szemle
      
  Nevada's State Agencies Shutter in Wake of Cyberattack
  In response to a cyberattack that was first detected on Sunday, the governor shut down in-person services for state offices while restoration efforts are underway.
      
            
      
  
27 Aug 2025
      
            Biztonsági szemle
      
  China Hijacks Captive Portals to Spy on Asian Diplomats
  The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites.
      
            
      
  Pagination
- Previous page ‹‹
 - Page 46
 - Next page ››