Security Bulletin

25 Apr 2025
Biztonsági szemle
Significant reduction in March ransomware incidence a potential ruse
Attacks involving ransomware were discovered by NCC Group to have totaled 600 in March which is 32% lower than in February but 46% higher than the same month last year with the month-to-month decline believed by NCC Head of Threat Intelligence Matt...

25 Apr 2025
Biztonsági szemle
BreachForums revival foiled amid alleged FBI seizure
Cybernews reports that BreachForums had its supposed Thursday comeback fall through, with its latest owner "Anastasia" selling the notorious cybercrime marketplace's backup database and source code for only $2,000 as they claimed yet another...

25 Apr 2025
Biztonsági szemle
Vehicles Face 45% More Attacks, 4 Times More Hackers
Two kinds of attacks are in high gear: ransomware attacks against OEMs and compromised electric vehicle chargers, according to data from Q1 2025.

25 Apr 2025
Biztonsági szemle
Phishing Kit Darcula Gets Lethal AI Upgrade
Recently added artificial intelligence capabilities on the Chinese-language Darcula phishing-as-a-service platform make phishing attacks easy for even the least technical hackers.

25 Apr 2025
Biztonsági szemle
AI agents feeding the dark web require new security tactics
Here are five ways teams can better defend against AI-powered attacks that feed dark web marketplaces.

25 Apr 2025
Biztonsági szemle
Sajtószemle – 2025. 17. hét
A 2025. 17. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.04.17. és 2025.04.24. között kezelt incidensek statisztikai adatait is tartalmazza.

25 Apr 2025
Biztonsági szemle
Example of a Payload Delivered Through Steganography, (Fri, Apr 25th)
In this diary, I'll show you a practical example of how steganography is used to hide payloads (or other suspicious data) from security tools and Security Analysts' eyes. Steganography can be defined like this: It is the art and science of...

25 Apr 2025
Biztonsági szemle
ISC Stormcast For Friday, April 25th, 2025 https://isc.sans.edu/podcastdetail/9424, (Fri, Apr 25th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

25 Apr 2025
Biztonsági szemle
[Virtual Event] Anatomy of a Data Breach: And what to do if it happens to you

24 Apr 2025
Biztonsági szemle
'SessionShark' ToolKit Evades Microsoft Office 365 MFA
The creators of the toolkit are advertising it as an educational and ethical resource, but what it promises to provide users if purchased indicates it's anything but.

24 Apr 2025
Biztonsági szemle
Digital Twins Bring Simulated Security to the Real World
By simulating business environments or running software, while incorporating real-time data from production systems, companies can model the impact of software updates, exploits, or disruptions.

24 Apr 2025
Biztonsági szemle
‘Vibe coding’ using LLMs susceptible to most common security flaws
OpenAI’s models were most likely to produce vulnerable code in tests by Backslash Security.
Pagination
- Previous page ‹‹
- Page 130
- Next page ››