Security Bulletin
5 Jun 2025
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-5419 Google Chromium V8 Out-of-Bounds Read and Write Vulnerability This type of vulnerability is a frequent...
5 Jun 2025
Biztonsági szemle
CyberData 011209 SIP Emergency Intercom
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: CyberData Equipment: 011209 SIP Emergency Intercom Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Missing...
5 Jun 2025
Biztonsági szemle
CISA Releases Seven Industrial Control Systems Advisories
CISA released seven Industrial Control Systems (ICS) advisories on June 5, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-155-01 CyberData 011209 SIP Emergency...
5 Jun 2025
Biztonsági szemle
Hitachi Energy Relion 670, 650 Series and SAM600-IO Product
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: Relion 670, Relion 650, SAM600-IO Vulnerabilities: Integer Overflow or Wraparound 2. RISK EVALUATION Successful...

5 Jun 2025
Biztonsági szemle
Iranian APT 'BladedFeline' Hides in Network for 8 Years
ESET published research on the Iranian APT "BladedFeline," which researchers believe is a subgroup of the cyber-espionage entity APT34.

5 Jun 2025
Biztonsági szemle
Be Careful With Fake Zoom Client Downloads, (Thu, Jun 5th)
Collaborative tools are really popular these days. Since the COVID-19 pandemic, many people switched to remote work positions and we need to collaborate with our colleagues or customers every day. Tools like Microsoft Teams, Zoom, WebEx, (name your...

5 Jun 2025
Biztonsági szemle
Cybersecurity Training in Africa Aims to Bolster Professionals' Ranks
The United Nations, Carnegie Mellon University, and private organizations are all aiming to train the next generation of cybersecurity experts, boost economies, and disrupt pipelines to armed groups.

5 Jun 2025
Biztonsági szemle
ISC Stormcast For Thursday, June 5th, 2025 https://isc.sans.edu/podcastdetail/9480, (Thu, Jun 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

5 Jun 2025
Biztonsági szemle
PKI, IAM and the crypto-agility trust imperative
DigiCert's Ashley Stevenson explores why unifying PKI and IAM is essential to closing identity-related trust gaps.

5 Jun 2025
Biztonsági szemle
Open-source Chaos RAT used in recent attacks targeting Linux
The free remote administration tool enables reverse shell access, file management and command execution.

4 Jun 2025
Biztonsági szemle
35K Solar Devices Vulnerable to Potential Hijacking
A little more than three-quarters of these exposed devices are located in Europe, followed by Asia, with 17%.

4 Jun 2025
Biztonsági szemle
Lumos touts 'Albus' as first AI agent for autonomous identity governance
New AI multi-agent system to assist organizations in scaling up identity governance and administration.
Pagination
- Previous page ‹‹
- Page 52
- Next page ››