Security Bulletin

27 Aug 2025
Biztonsági szemle
Anthropic AI Used to Automate Data Extortion Campaign
The company said the threat actor abused its Claude Code service to "an unprecedented degree," automating reconnaissance, intrusions, and credential harvesting.

27 Aug 2025
Biztonsági szemle
'ZipLine' Phishers Flip Script as Victims Email First
"ZipLine" appears to be a sophisticated and carefully planned campaign that has already affected dozens of small, medium, and large organizations across multiple industry sectors.

27 Aug 2025
Biztonsági szemle
Nevada's State Agencies Shutter in Wake of Cyberattack
In response to a cyberattack that was first detected on Sunday, the governor shut down in-person services for state offices while restoration efforts are underway.

27 Aug 2025
Biztonsági szemle
China Hijacks Captive Portals to Spy on Asian Diplomats
The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites.

27 Aug 2025
Biztonsági szemle
Google: Salesforce Attacks Stemmed From Third-Party App
A group tracked as UNC6395 engaged in "widespread data theft" via compromised OAuth tokens from a third-party app called Salesloft Drift.

27 Aug 2025
Biztonsági szemle
In-Demand Skills for the Modern Network Engineer
How can I make sure my skills stay relevant in my industry? What skills are most in-demand for the job I have now – and the job I want in three years? At Learn with Cisco, these are the questions we hear all the time. And advances in AI put pressure...

27 Aug 2025
Biztonsági szemle
Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Attack
The financially motivated threat group used cloud resources to conduct a complex, ransomware-style attack against an enterprise victim.

27 Aug 2025
Biztonsági szemle
CVE-2025-40779: Kea crash upon interaction between specific client options and subnet selection
CVE: CVE-2025-40779 Title: Kea crash upon interaction between specific client options and subnet selection Document version: 2.0 Posting date: 27 August 2025 Program impacted: Kea Versions affected: Kea 2.7.1 -> 2.7.9 3.0.0 3.1.0 Versions NOT...

27 Aug 2025
Biztonsági szemle
AI-Powered Ransomware Has Arrived With 'PromptLock'
Researchers raise the alarm that a new, rapidly evolving ransomware strain uses an OpenAI model to render and execute malicious code in real time, ushering in a new era of cyberattacks against enterprises.

27 Aug 2025
Biztonsági szemle
Gaps in California Privacy Law: Half of Data Brokers Ignore Requests
Failure to comply with consumer data access and deletion requests highlights the urgent need for standardized verification processes and stronger enforcement mechanisms to protect consumer privacy.

27 Aug 2025
Biztonsági szemle
Get Ahead of the HIPAA Security Rule Update With Secure Workload
Cisco Secure Workload is foundational for organizations seeking to implement an effective microsegmentation strategy. It empowers orgs to safeguard assets.

27 Aug 2025
Biztonsági szemle
African Law Enforcement Agencies Nab Cybercrime Syndicates
African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.
Pagination
- Previous page ‹‹
- Page 37
- Next page ››