Security Bulletin
30 Oct 2025
Biztonsági szemle
Cloud Outages Highlight the Need for Resilient, Secure Infrastructure Recovery
Two massive technical outages over the past year underscore the need for cybersecurity teams to consider how to recover safely from disruptions without creating new security risks.
30 Oct 2025
Biztonsági szemle
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
This week, I noticed some new HTTP request headers that I had not seen before:
30 Oct 2025
Biztonsági szemle
Data Leak Outs Students of Iran's MOIS Training Academy
A school for the Iranian state hackers of tomorrow has itself, ironically, been hacked.
30 Oct 2025
Biztonsági szemle
ISC Stormcast For Thursday, October 30th, 2025 https://isc.sans.edu/podcastdetail/9678, (Thu, Oct 30th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
30 Oct 2025
Biztonsági szemle
Data Security Posture Management — What Does 'Best in Class' Look Like?
The emergence of Data Security Posture Management (DSPM) in early 2023, followed by major acquisitions by companies like IBM, Thales, and Palo Alto Networks, demonstrates industry recognition of the need for a more holistic approach to data...
29 Oct 2025
Biztonsági szemle
Malicious NPM Packages Disguised With 'Invisible' Dependencies
In the "PhantomRaven" campaign, threat actors published 126 malicious npm packages that have flown under the radar, while collecting 86,000 downloads.
29 Oct 2025
Biztonsági szemle
AI Search Tools Easily Fooled by Fake Content
New research shows AI crawlers like Perplexity, Atlas, and ChatGPT are surprisingly easy to fool.
29 Oct 2025
Biztonsági szemle
Dentsu Subsidiary Breached, Employee Data Stolen
A subsidiary of Japanese marketing and PR giant Dentsu lost sensitive data to unidentified threat actors, the parent company said.
29 Oct 2025
Biztonsági szemle
Microsoft Security Change for Azure VMs Creates Pitfalls
Firms using Azure infrastructure gained a reprieve from a security-focused switch that could have broken apps that relied on public Internet access.
29 Oct 2025
Biztonsági szemle
Botnets Step Up Cloud Attacks Via Flaws, Misconfigurations
Infamous botnets like Mirai are exploiting Web-exposed assets such as PHP servers, IoT devices, and cloud gateways to gain control over systems and build strength.
29 Oct 2025
Biztonsági szemle
Build Toward What’s Next with Cisco Marketplace
Cisco Marketplace helps IT teams modernize operations with curated integrations to automate tasks, cut alert noise, and connect workflows. Start now.
29 Oct 2025
Biztonsági szemle
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
The best security training programs build strong security culture by focusing on high-risk groups, including developers, executives, and finance pros.
Pagination
- Previous page ‹‹
- Page 73
- Next page ››