Security Bulletin
10 Jun 2025
Biztonsági szemle
CISA Releases Four Industrial Control Systems Advisories
CISA released four Industrial Control Systems (ICS) advisories on June 10, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-160-01 SinoTrack GPS Receiver ICSA-25...
10 Jun 2025
Biztonsági szemle
SinoTrack GPS Receiver
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.8 ATTENTION: Exploitable remotely/Low attack complexity Vendor: SinoTrack Equipment: All Known SinoTrack Devices Vulnerabilities: Weak Authentication, Observable Response Discrepency 2. RISK EVALUATION...
10 Jun 2025
Biztonsági szemle
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability CVE-2025-33053 Web Distributed...

10 Jun 2025
Biztonsági szemle
Trump executive order alters Biden-era cybersecurity regulations
Order could have a ripple effect on private-sector identity management for contractors.

10 Jun 2025
Biztonsági szemle
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334

10 Jun 2025
Biztonsági szemle
ISC Stormcast For Tuesday, June 10th, 2025 https://isc.sans.edu/podcastdetail/9486, (Tue, Jun 10th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

10 Jun 2025
Biztonsági szemle
Complex npm attack uses 7-plus layers of obfuscation to spread Pulsar RAT
The package uses Japanese Unicode characters, hex encoding, Base64 and more to hide its actions.

9 Jun 2025
Biztonsági szemle
New Trump Cybersecurity Order Reverses Biden, Obama Priorities
The White House put limits on cyber sanctions, killed the digital ID program, and refocused the government's cyber activities to enabling AI, rolling out post-quantum cryptography, and promoting secure software design.

9 Jun 2025
Biztonsági szemle
OpenAI Bans ChatGPT Accounts Linked to Nation-State Threat Actors
The AI company's investigative team found that many accounts were using the program to engage in malicious activity around the world, such as employment schemes, social engineering, and cyber espionage.

9 Jun 2025
Biztonsági szemle
'Librarian Ghouls' Cyberattackers Strike at Night
Since at least December, the advanced persistent threat (APT) group has been using legit tools to steal data, dodge detection, and drop cryptominers on systems belonging to organizations in Russia.

9 Jun 2025
Biztonsági szemle
Gartner: How Security Teams Can Turn Hype Into Opportunity
During the opening keynote at Gartner Security & Risk Management Summit 2025, analysts weighed in on how CISOs and security teams can use security fervor around AI and other tech to the betterment of their security posture.

9 Jun 2025
Biztonsági szemle
Encryption and decryption: The foundation of data protection
Ensuring information remains confidential and secure is a core cybersecurity technique.
Pagination
- Previous page ‹‹
- Page 28
- Next page ››