Security Bulletin
30 Jun 2025
Biztonsági szemle
Remcos RAT spread via hijacked school, small business accounts
Schools and small businesses have had their email accounts breached to spread phishing emails delivering the Remcos RAT malware in attack campaigns since last year, Hackread reports.
30 Jun 2025
Biztonsági szemle
Secure Endpoint Enhancements Elevate Cisco XDR and Breach Protection Suite
Discover how Secure Endpoint enhancements elevate Cisco XDR and the Breach Protection Suite with better visibility and advanced threat defense.
30 Jun 2025
Biztonsági szemle
How Cisco is powering entrepreneurship in South Africa
Discover how Cisco, in partnership with WomHub, is empowering entrepreneurship and women in STEM in South Africa through digital skills training, innovation, and sustainable growth.
30 Jun 2025
Biztonsági szemle
ISC Stormcast For Monday, June 30th, 2025 https://isc.sans.edu/podcastdetail/9510, (Mon, Jun 30th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
27 Jun 2025
Biztonsági szemle
CISA warns of flaws in Mitsubishi Electronics ICS hardware
The U.S. government is warning organizations to check their operational technology (OT) networks following the disclosure of new vulnerabilities in industrial control system (ICS) hardware.
27 Jun 2025
Biztonsági szemle
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
27 Jun 2025
Biztonsági szemle
Top Apple, Google VPN Apps May Help China Spy on Users
Apple and Google espouse strong values about data privacy, but they allow programs from a Big Brother state to thrive on their app stores, researchers allege.
27 Jun 2025
Biztonsági szemle
MacOS malware Poseidon Stealer rebranded as Odyssey Stealer
Malicious AppleScript distributed via ClickFix exfiltrates Keychain credentials, browser data and more.
27 Jun 2025
Biztonsági szemle
MOVEit Transfer systems scans jump significantly
Spike potentially AI-fueled, but experts say it could be an opportunity to learn more faster about the hackers’ intentions.
27 Jun 2025
Biztonsági szemle
'CitrixBleed 2' Shows Signs of Active Exploitation
If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, all while remaining undetected.
27 Jun 2025
Biztonsági szemle
AI won’t save identity if it can’t tell a dog’s paw from a fingerprint
At Identiverse 2025, Protect AI CISO Diana Kelley warned that artificial intelligence may be powerful, but it’s not always right. When it comes to identity, hallucinations can be dangerous — and trust must be earned.
27 Jun 2025
Biztonsági szemle
Scattered Spider Taps CFO Credentials in 'Scorched Earth' Attack
In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and Snowflake environments, and for the first known time, actively fought back against incident response...
Pagination
- Previous page ‹‹
- Page 126
- Next page ››