Security Bulletin
31 Jul 2025
Biztonsági szemle
Getting a Cybersecurity Vibe Check on Vibe Coding
Following a number of high-profile security and development issues surrounding the use of LLMs and GenAI to code and create applications, it's worth taking a temperature check to ask: Is this technology ready for prime time?
31 Jul 2025
Biztonsági szemle
What the Coinbase Breach Says About Insider Risk
The lesson from the breach is not just about what went wrong — but what could have gone right.
31 Jul 2025
Biztonsági szemle
Dark Reading Confidential: Funding the CVE Program of the Future
Dark Reading Confidential Episode 8: Federal funding for the CVE Program expires in April 2026, and a trio of experts agree the industry isn't doing enough to deal with the looming crisis. Bugcrowd's Trey Ford, expert Adam Shostack, and CVE historian...
31 Jul 2025
Biztonsági szemle
Striving for Sustainability: Meet Nicole
Nicole Kenney, Program Manager on the Packaging Engineering team, shares more about her work on packaging and material circularity.
31 Jul 2025
Biztonsági szemle
Low-Code Tools in Microsoft Azure Allowed Unprivileged Access
Using the API Connections for Azure Logic Apps, a security researcher found unauthenticated users could access sensitive data of other customers.
31 Jul 2025
Biztonsági szemle
ISC Stormcast For Thursday, July 31st, 2025 https://isc.sans.edu/podcastdetail/9550, (Thu, Jul 31st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
31 Jul 2025
Biztonsági szemle
Koreans Hacked, Blackmailed by 250+ Fake Mobile Apps
A swath of copycat Korean apps are hiding spyware, occasionally leading to highly personal, disturbing extortions.
31 Jul 2025
Biztonsági szemle
Tonic Security Harnesses AI to Combat Remediation Challenges
Attackers are becoming faster at exploiting vulnerabilities, but this startup seeks to stop threats before they lead to breaches.
30 Jul 2025
Biztonsági szemle
Palo Alto Networks Grabs IAM Provider CyberArk for $25B
The deal shakes up the identity and access management landscape and expands Palo Alto Networks' footprint in the cybersecurity market.
30 Jul 2025
Biztonsági szemle
Inside the FBI's Strategy for Prosecuting Ransomware
The US government is throwing the book at even midlevel cybercriminals. Is it just — and is it working?
30 Jul 2025
Biztonsági szemle
Silk Typhoon Linked to Powerful Offensive Tools, PRC-Backed Companies
An unsealed indictment associated with the Chinese threat group shows its members worked for companies closely aligned with the PRC as part of a larger contractor ecosystem.
30 Jul 2025
Biztonsági szemle
Securing Firebase: Lessons Re-Learned from the Tea Breach, (Wed, Jul 30th)
Today we are trying something a bit different (again). Brandon Evans, senior instructor with SANS, contributed the video below, talking a bit about the breach of the Tea App, and how to prevent and detect this vulnerability.
Pagination
- Previous page ‹‹
- Page 69
- Next page ››