Security Bulletin

24 Apr 2025
Biztonsági szemle
Attacks against Teltonika Networks SMS Gateways, (Thu, Apr 24th)
Ever wonder where all the SMS spam comes from? If you are trying to send SMS "at scale," there are a few options: You could sign up for a messaging provider like Twilio, the AWS SNS service, or several similar services. These services offer easily...

24 Apr 2025
Biztonsági szemle
US cyber progress potentially jeopardized by proposed State Department overhaul
Significant strides made by the U.S. in combating international cybersecurity threats and forging digital collaborations with other nations were noted by cybersecurity experts and former officials to potentially be endangered by the Trump...

24 Apr 2025
Biztonsági szemle
US data security fears prompt subpoena on Chinese telcos
Reuters reports that major Chinese state-run telecommunications firms China Telecom, China Mobile, and China Unicom have been subpoenaed by the House Committee on China lawmakers to respond to queries concerning the security of Americans' data...

24 Apr 2025
Biztonsági szemle
Data breach victimization in the US escalates
More than 91.3 million individuals across the U.S. have been impacted by data breaches during the first quarter of 2025, which is 26% higher than the same period last year, even though breach incidents slightly declined year-over-year, according to...

24 Apr 2025
Biztonsági szemle
Web skimmer campaign targets Caritas Spain's donation sites
Cybernews reports that Caritas Internationalis, the Catholic Church's official charity organization, had at least 17 websites of its Spanish arm compromised as part of a web skimmer campaign that commenced in February 2024.

24 Apr 2025
Biztonsági szemle
WorkComposer misconfiguration exposes over 21M screenshots
Widely used workplace time tracking and productivity monitoring software WorkComposer had over 21 million screenshots of employee devices unintentionally leaked by an unprotected Amazon S3 bucket, Cybernews reports.

24 Apr 2025
Biztonsági szemle
Navigating Regulatory Shifts & AI Risks
By proactively embracing emerging trends around encryption, AI security, and platform consolidation, organizations can turn compliance burdens into competitive advantage.

24 Apr 2025
Biztonsági szemle
Over 260K compromised in Kelly Benefits breach
Kelly Benefits, a Maryland-based benefits administration and payroll solutions provider, has confirmed that almost 264,000 individuals served by its customers Amergis, CareFirst, Beam Benefits, Intercon Truck of Baltimore, Beltway Companies, The...

24 Apr 2025
Biztonsági szemle
From ransomware recovery to endpoint security innovation: The ThreatLocker story
Danny Jenkins founded ThreatLocker to revolutionize endpoint security by implementing comprehensive zero-trust controls and blocking software by default, challenging the traditional cybersecurity approach.

24 Apr 2025
Biztonsági szemle
Why comprehensive scan coverage is critical for DevSecOps lifecycle success and regulatory compliance
Picking over code doesn’t guarantee problem-free software. Only automated scans that analyze first- and third-party code can provide the total visibility required to comply with the CRA and other new digital-security regulations.

24 Apr 2025
Biztonsági szemle
Black Hat Asia 2025: Innovation in the SOC
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
24 Apr 2025
Biztonsági szemle
Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: iSTAR Configuration Utility (ICU) Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful...
Pagination
- Previous page ‹‹
- Page 132
- Next page ››