Security Bulletin

7 Feb 2025
Biztonsági szemle
LLM Hijackers Quickly Incorporate DeepSeek API Keys
The secret use of other people's generative AI platforms, wherein hijackers gain unauthorized access to an LLM while someone else foots the bill, is getting quicker and stealthier by the month.

7 Feb 2025
Biztonsági szemle
SolarWinds to Go Private for $4.4B
Five years after a Russian APT infiltrated a software update to gain access to thousands of SolarWinds customers, the board has voted unanimously to sell at a top valuation and plans for uninterrupted operations.

7 Feb 2025
Biztonsági szemle
Microsoft: Thousands of Public ASP.NET Keys Allow Web Server RCE
Developers are pulling in publicly available ASP.NET keys into their environments, without realizing that cyberattackers can use them for clandestine code injection.

7 Feb 2025
Biztonsági szemle
3,000 exposed ASP.NET keys could perform code injection attacks
Microsoft worries the leaked keys could be pushed into development code without modification, leaving it open to security issues.

7 Feb 2025
Biztonsági szemle
Evolving cloud landscape leads to security challenges
To address these threats artificial intelligence-powered tools have been developed to enhance threat detection and response, while zero-trust architecture has become a widely accepted framework for cloud security thanks to its strict identity...

7 Feb 2025
Biztonsági szemle
Cloud-driven security market set to reach $38B by 2029
The growth is being driven by cloud-first security approaches, hybrid work models, and artificial intelligence-powered solutions, according to the report, which pointed to cloud security as the greatest driver.

7 Feb 2025
Biztonsági szemle
Google Cloud report highlights persistent cloud security risks
Google Cloud's Threat Horizons report found weak or absent passwords leading as the access method most commonly exploited by threat actors, accounting for 46% of initial breaches.

7 Feb 2025
Biztonsági szemle
Oligo raises $50M to enhance real-time cloud application protection
Oligo’s platform provides deep application inspection at runtime, allowing security teams to identify flaws in code at the library and function levels and address them before they could be exploited.

7 Feb 2025
Biztonsági szemle
Solvo’s cloud security technology acquired by CYE
CYE said it plans to integrate Solvo’s technology into its Hyber platform to improve the solution's cloud security posture management and cloud infrastructure entitlement management capabilities.

7 Feb 2025
Biztonsági szemle
Campaign exploits outdated WordPress sites to spread password-stealing malware
According to security researchers at web security firm c/side, the attack is widespread, with over 10,000 websites reportedly compromised.

7 Feb 2025
Biztonsági szemle
Many state privacy laws fail to protect consumer data, report finds
Eight of the 19 states with consumer privacy data laws that were evaluated by the two organizations were deemed ineffective.

7 Feb 2025
Biztonsági szemle
Rev Up to Recert: Harness the Skills to Power AI Infrastructure
Introducing Rev Up to Recert: AI, featuring 34 hours of free learning, earning active Cisco certification holders up to 34 Continuing Education credits—for free.
Pagination
- Previous page ‹‹
- Page 293
- Next page ››