Security Bulletin

14 Jul 2025
Biztonsági szemle
Military Veterans May Be What Cybersecurity Is Looking For
As the field struggles with a shortage, programs that aim to provide veterans with the technical skills needed to succeed in cybersecurity may be the solution for everyone.

14 Jul 2025
Biztonsági szemle
Google Gemini AI Bug Allows Invisible, Malicious Prompts
A prompt-injection vulnerability in the AI assistant allows attackers to create messages that appear to be legitimate Google Security alerts but instead can be used to target users across various Google products with vishing and phishing.

14 Jul 2025
Biztonsági szemle
DShield Honeypot Log Volume Increase, (Mon, Jul 14th)
The volume of honeypot logs changes over time. Very rarely are honeypot logs quiet, meaning that there are no internet scans or malicious activity generating logs. Honeypots can see large increases in activity [1], but this has tended to be the...

14 Jul 2025
Biztonsági szemle
The Dark Side of Global Power Shifts & Demographic Decline
As global power realigns and economies falter, the rise in cybercrime is no longer hypothetical — it's inevitable.

14 Jul 2025
Biztonsági szemle
From classroom to career: Ghana’s new gateway to tech success
Cisco's collaboration with BASICS International launched the Chorkor Digital Lab in Ghana, empowering students with tech skills for careers in cybersecurity and networking, with support from Cisco Networking Academy and the Technology Grant Program.

14 Jul 2025
Biztonsági szemle
ISC Stormcast For Monday, July 14th, 2025 https://isc.sans.edu/podcastdetail/9524, (Mon, Jul 14th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

14 Jul 2025
Biztonsági szemle
Experimental Suspicious Domain Feed, (Sun, Jul 13th)
We have had a "newly registered domain" feed for a few years. This feed pulls data from ICANN's centralized zone data service ( https://czds.icann.org) and TLS certificate transparency logs.

11 Jul 2025
Biztonsági szemle
Pay2Key Ransomware Gang Resurfaces With Incentives to Attack US, Israel
The ransomware-as-a-service (RaaS) operation, which has been tied to an Iranian advanced persistent threat (APT) group, recently boosted its affiliate profit share to 80% for attacks on Western targets.

11 Jul 2025
Biztonsági szemle
350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE
Mercedes, Skoda, and Volkswagen vehicles, as well as untold industrial, medical, mobile, and consumer devices, may be exposed to a vulnerable Bluetooth implementation called "PerfektBlue."

11 Jul 2025
Biztonsági szemle
As Cyber-Insurance Premiums Drop, Coverage Is Key to Resilience
Cyber-insurance premiums continue to decline from their explosive growth from 2020 to 2022, but coverage is more important than ever to manage risks, experts say.

11 Jul 2025
Biztonsági szemle
How Post-Quantum Cryptography Affects Security and Encryption Algorithms
The advent of quantum computing represents a fundamental shift in computational capabilities that threatens the cryptographic foundation of modern digital security. As quantum computers evolve from… Read more on Cisco Blogs

11 Jul 2025
Biztonsági szemle
Factoring Cybersecurity Into Finance's Digital Strategy
As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and responsible cybersecurity practices.
Pagination
- Previous page ‹‹
- Page 49
- Next page ››