Security Bulletin
10 Jul 2025
Biztonsági szemle
Agentic AI's Risky MCP Backbone Opens Brand-New Attack Vectors
Critical security vulnerabilities affect different parts of the Model Context Protocol (MCP) ecosystem, which many organizations are rapidly adopting in order to integrate AI models with external data sources.
10 Jul 2025
Biztonsági szemle
4 Arrested in UK Over M&S, Co-op, Harrods Hacks
The UK's National Crime Agency arrested four people, who some experts believe are connected to the notorious cybercriminal collective known as Scattered Spider.
10 Jul 2025
Biztonsági szemle
Kea HA Strategies Comparison
Introduction Kea's High Availability hook is the recommended solution for high availability operation. The Kea HA hook works by pairing Kea servers (a multi-node solution is also available), in either an active-active or active-passive collaboration...
10 Jul 2025
Biztonsági szemle
Kea Shared Lease Database Quickstart
Introduction In some cases, administrators may want to configure Kea to use the "Shared Lease Database" High Availability method. This method has certain advantages when compared to the HA Hook. The advantages and disadvantages of each method are...
10 Jul 2025
Biztonsági szemle
SIM Swap Fraud Is Surging — and That's a Good Thing
Now it's time to build systems that attackers can't reroute with a phone call.
10 Jul 2025
Biztonsági szemle
Cisco Catalyst 8300 Excels in NetSecOPEN NGFW SD-WAN Security Tests
Cisco Catalyst 8300 earns NetSecOPEN certification for exceptional real-world NGFW and SD-WAN performance under modern enterprise conditions.
10 Jul 2025
Biztonsági szemle
Collecting client queries for DNS server testing
Introduction Testing DNS servers, particularly Recursive Servers (Resolvers) involves many variables which need to be taken into account. The best that you can do is to approximate the scenario in which a real production server would find itself. The...
10 Jul 2025
Biztonsági szemle
ISC Stormcast For Thursday, July 10th, 2025 https://isc.sans.edu/podcastdetail/9520, (Thu, Jul 10th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
10 Jul 2025
Biztonsági szemle
North American APT Uses Exchange Zero-Day to Attack China
Stories about Chinese APTs attacking the US and Canada are plentiful. In a turnabout, researchers found what they believe is a North American entity attacking a Chinese entity, thanks to a mysterious issue in Microsoft Exchange.
10 Jul 2025
Biztonsági szemle
SSH Tunneling in Action: direct-tcp requests [Guest Diary], (Wed, Jul 9th)
[This is a Guest Diary by Sihui Neo, an ISC intern as part of the SANS.edu BACS program]
10 Jul 2025
Biztonsági szemle
Browser Exploits Wane as Users Become the Attack Surface
For browsers, exploitation is out — and getting users to compromise their own systems is in. Improved browser security has forced attackers to adapt their tactics, and they've accepted the challenge.
9 Jul 2025
Biztonsági szemle
Kea Database Connection Resilience
Introduction This document discusses database connectivity problems, parameters that can be adjusted to make Kea compensate for those problems, and some of the implications of doing so. Scenario Symptoms Often this discussion begins with error...
Pagination
- Previous page ‹‹
- Page 84
- Next page ››