Security Bulletin

7 May 2025
Biztonsági szemle
Weaver joins Pax8 to boost AI for MSPs
Pax8 has appointed Chance Weaver as its new vice president of AI adoption for the Americas.

7 May 2025
Biztonsági szemle
Startup Tesseral launches with secure auth tools
Designed for SaaS developers, Tesseral’s open-source platform aims to eliminate the need for in-house authentication builds by offering enterprise-grade tools that support standards like SAML and SCIM.

7 May 2025
Biztonsági szemle
Google Cloud most vulnerable among major cloud platforms, report says
Google Cloud had the highest cloud vulnerability prevalence among major cloud service providers, with 38% of Google Cloud-hosted assets having at least one security flaw, according to the CyCognito report.

7 May 2025
Biztonsági szemle
Todd Snyder subjected to $345K fine over California privacy violations
Aside from the monetary penalty, Todd Snyder will also reconfigure its privacy portal to ensure the adoption of appropriate customer opt-out mechanisms.

7 May 2025
Biztonsági szemle
Over $167M to be paid by NSO Group to WhatsApp over spyware hack
Such a jury ruling, which is set to be appealed by NSO Group, was hailed by WhatsApp to be "the first victory" against illegal spyware development and usage.

7 May 2025
Biztonsági szemle
Trump's Defense Department cyber policy nominee pledges to bolster cyber threat deterrence
Katie Sutton, who was nominated by President Donald Trump to become assistant secretary of defense for cyber policy, has committed to strengthening the U.S.'s cyber threat deterrence strategy by combining "denial, resilience, and credible responses"...

7 May 2025
Biztonsági szemle
Infrastructure as Code: An IaC Guide to Cloud Security
IaC is powerful. It brings speed, scale, and structure to cloud infrastructure. But none of that matters if your security can't keep up.

7 May 2025
Biztonsági szemle
Building Families: How Cisco’s Supportive Policies Made My Motherhood Possible
Communications Manager Amanda W. shares her journey to motherhood, and how Cisco's support, flexibility, and benefits made her dream of growing her family possible.
7 May 2025
Biztonsági szemle
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-6047 GeoVision Devices OS Command Injection Vulnerability CVE-2024-11120 GeoVision Devices OS Command Injection...

7 May 2025
Biztonsági szemle
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394

7 May 2025
Biztonsági szemle
Cisco Study Reveals Alarming Deficiencies in European Cybersecurity Readiness
AI is reshaping the world, introducing cyber risks of a magnitude never before encountered. Cisco’s report highlights the critical gaps in Europe's security readiness in the AI era.

7 May 2025
Biztonsági szemle
Example of "Modular" Malware, (Wed, May 7th)
Developers (of malware as well as goodware) don't have to reinvent the wheel all the time. Why rewrite a piece of code that was development by someone else? In the same way, all operating systems provide API calls (or system calls) to...
Pagination
- Previous page ‹‹
- Page 105
- Next page ››