Security Bulletin

6 Jun 2025
Biztonsági szemle
Immediate equipment flaw remediation conducted by water utilities, study finds
Fewer than 6% of U.S. water utilities' human-machine interfaces were online in a read-only or unauthenticated state last month following the discovery of almost 400 internet-exposed HMIs in the sector late last year, less than a quarter of which were...

6 Jun 2025
Biztonsági szemle
Misconfiguration exposes data from over 3.6M Passion.io users, creators
Major app-building platform Passion.io had data from over 3.6 million creators and users inadvertently leaked by an exposed database, reports Hackread.

6 Jun 2025
Biztonsági szemle
More than 4B user records compromised in largest Chinese data leak yet
Cybernews reports that hundreds of millions of individuals in China potentially had their information exposed by an insecure 631 GB database that contained four billion records, making it the largest data leak in the country so far.

6 Jun 2025
Biztonsági szemle
Bogus Cloudflare Turnstile leveraged in new ClickFix-style intrusion
Threat actors have leveraged counterfeit Cloudflare Turnstile challenges used to check 'humanness' to facilitate clandestine malware compromise as part of a new ClickFix-style campaign, SecurityWeek reports.

6 Jun 2025
Biztonsági szemle
From Design to Impact: Circular design across Cisco’s product life cycle
The following is an excerpt from our FY24 Purpose Report, celebrating 40 years of impact at Cisco. Data and metrics are reflective of Cisco’s fiscal year 2024, ending on July 31, 2024. Circular design means designing products, packaging, and systems...

6 Jun 2025
Biztonsági szemle
MSFT-CrowdStrike 'Rosetta Stone' for Naming APTs: Meh?
Microsoft and CrowdStrike announced an effort to deconflict the overlapping names of threat groups and reduce confusion for companies, but we've been here before.

6 Jun 2025
Biztonsági szemle
Data-driven identity leadership - Saviynt Field CTO David Lee
In this podcast episode, we explore the power of data-driven identity leadership and how organizations can leverage analytics to enhance their identity security strategies.

6 Jun 2025
Biztonsági szemle
Why IAM & PAM managed services are now business essentials - IDM Express Founder Amit Masand
This segment explores how IAM and PAM managed services are helping companies reduce risk, simplify operations, and stay ahead of evolving security challenges.

6 Jun 2025
Biztonsági szemle
Identity management in its totality - AxoniusX CEO Amir Ofek
In this session, Amir Ofek, CEO of AxoniusX, shares how Axonius is modernizing IGA with real-time enforcement, unified asset-to-identity context, and a radically different approach to controlling access across dynamic environments.

6 Jun 2025
Biztonsági szemle
Clientless ZTNA promises to take teams beyond the VPN
Here’s how ZTNA can protect companies from third-party breaches.

6 Jun 2025
Biztonsági szemle
Sajtószemle – 2025. 23. hét
A 2025. 23. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.05.30. és 2025.06.05. között kezelt incidensek statisztikai adatait is tartalmazza.

6 Jun 2025
Biztonsági szemle
ISC Stormcast For Friday, June 6th, 2025 https://isc.sans.edu/podcastdetail/9482, (Fri, Jun 6th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Pagination
- Previous page ‹‹
- Page 46
- Next page ››