Security Bulletin

17 Sep 2025
Biztonsági szemle
Fusing Security into Networks: The Next Evolution in Enterprise Protection
Today’s networks are dynamic, distributed, and constantly under attack—making traditional, bolt-on security tools insufficient. Cisco® AI-Ready Secure Network Architecture embeds multilayered secu… Read more on Cisco Blogs

17 Sep 2025
Biztonsági szemle
AI-Powered Sign-up Fraud Is Scaling Fast
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.

17 Sep 2025
Biztonsági szemle
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.

17 Sep 2025
Biztonsági szemle
CTRL-Z DLL Hooking, (Wed, Sep 17th)
When you're debugging a malware sample, you probably run it into a debugger and define some breakpoints. The idea is to take over the program control before it will perform âinterestingâ actions. Usually, we set breakpoints on memory...

17 Sep 2025
Biztonsági szemle
ISC Stormcast For Wednesday, September 17th, 2025 https://isc.sans.edu/podcastdetail/9616, (Wed, Sep 17th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

17 Sep 2025
Biztonsági szemle
North Korean Group Targets South With Military ID Deepfakes
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.

16 Sep 2025
Biztonsági szemle
Ray Security Takes an Active Data Security Approach
A data security platform based on action is what the industry needs right now to protect enterprise data.

16 Sep 2025
Biztonsági szemle
Unlock Unified Network and Security Analytics with Cisco and Splunk
As we continue our video series — NetGru: Month of Networking — we’ll show you how to unlock unified network and security analytics with the Cisco Enterprise Networking app for Splunk. Hosted by Principal Engineer Adrian Illiesiu, this weekly...

16 Sep 2025
Biztonsági szemle
Critical Bugs in Chaos Mesh Enable Cluster Takeover
"Chaotic Deputy" is a set of four vulnerabilities in the chaos engineering platform that many organizations use to test the resilience of their Kubernetes environments.

16 Sep 2025
Biztonsági szemle
Self-Replicating 'Shai-hulud' Worm Targets NPM Packages
The newly emerged worm has spread across hundreds of open source software packages, stealing credentials and infecting other components without much direct attacker input.

16 Sep 2025
Biztonsági szemle
'Vane Viper' Threat Group Tied to PropellerAds, Commercial Entities
Researchers say the commercial adtech platform and several other companies form the infrastructure of a massive cybercrime operation.

16 Sep 2025
Biztonsági szemle
What Profitable Partners Do Differently
Join us at Cisco Partner Summit 2025 in San Diego, November 3-5, to discover how profitable partnerships and Cisco 360 drive durable growth and innovation in your business.
Pagination
- Previous page ‹‹
- Page 22
- Next page ››