Security Bulletin
21 Aug 2025
      
            Biztonsági szemle
      
  Scattered Spider Member Sentenced to a Decade in Prison
  Noah Michael Urban, 20, was one of several members of the Scattered Spider collective who were arrested and charged in 2024 in connection with high-profile cyberattacks.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Easy ChatGPT Downgrade Attack Undermines GPT-5 Security
  By using brief, plain clues in their prompts that are likely to influence the app to query older models, a user can downgrade ChatGPT for malicious ends.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  How Architectural Controls Help Can Fill the AI Security Gap
  NCC Group's David Brauchler III shared how foundational controls and threat modeling strategies can help secure agentic AI tools in ways traditional guardrails can't.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Hackers Abuse VPS Infrastructure for Stealth, Speed
  New research highlights how threat actors abuse legitimate virtual private server offerings in order to spin up infrastructure cheaply, quietly, and fast.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  K-12 School Incident Response Plans Fall Short
  Quick recovery relies on three security measures.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  The power of ten — and the power of Purpose
  With ten days off to volunteer through our Time2Give program, $10,000 in matching donations, and tens of thousands employees participating, Cisconians are empowered to turn Purpose into action. See our impact in FY25, and what's ahead for FY26.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Tree of AST: A Bug-Hunting Framework Powered by LLMs
  Teenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitations of the past.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Prepping the Front Line for MFA Social Engineering Attacks
  Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Tailing Hackers, Columbia University Uses Logging to Improve Security
  Logging netflows provided valuable insight about attacker tactics during a breach by state-sponsored hackers targeting Columbia's research labs.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  DARPA: Closing the Open Source Security Gap With AI
  DARPA's Kathleen Fisher discusses the AI Cyber Challenge at DEF CON 33, and the results that proved how automation can help patch vulnerabilities at scale.
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
  A lot of people like the command line, the CLI, the shell (name it as you want) because it provides a lot of powerful tools to perform investigations. The best example is probably parsing logs! Even if we have SIEM to ingest and process them, many...
      
            
      
  
21 Aug 2025
      
            Biztonsági szemle
      
  Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail
  At one point, Al-Tahery Al-Mashriky was hacking thousands of websites within the span of three months while stealing personal data and sensitive information.
      
            
      
  Pagination
- Previous page ‹‹
 - Page 51
 - Next page ››