Security Bulletin
3 Oct 2025
Biztonsági szemle
Sajtószemle – 2025. 40. hét
Megjelent a 2025. 40. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.09.26. és 2025.10.02. között kezelt incidensek, valamint az elosztott kormányzati IT biztonsági csapdarendszerből (GovProbe1) származó adatok statisztikai eloszlását is...
3 Oct 2025
Biztonsági szemle
ISC Stormcast For Friday, October 3rd, 2025 https://isc.sans.edu/podcastdetail/9640, (Fri, Oct 3rd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2 Oct 2025
Biztonsági szemle
There Are More CVEs, But Cyber Insurers Aren't Altering Policies
With nearly 47,000 CVEs expected by the end of the year, organizations must balance comprehensive vulnerability management with strategic cyber insurance policy selection to effectively navigate this rapidly evolving threat landscape.
2 Oct 2025
Biztonsági szemle
For One NFL Team, Tackling Cyber Threats Is Basic Defense
The NFL's cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber defense coordinator from the Cleveland Browns.
2 Oct 2025
Biztonsági szemle
Red Hat Investigates Widespread Breach of Private GitLab Repositories
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
2 Oct 2025
Biztonsági szemle
Cybersecurity Awareness Month: Become a Champion of Digital Resilience
Cybersecurity Awareness Month is here, and so are our tried-and-true offers to help you leap to the forefront of cyber tech. There’s never been a better time to find your place in cybersecurity or take your career to the next level. This month, it’s...
2 Oct 2025
Biztonsági szemle
More .well-known Scans, (Thu, Oct 2nd)
I have been writing about the ".well-known" directory a few times before. Recently, about attackers hiding webshells [1], and before that, about the purpose of the directory and why you should set up a "/.well-known/security.txt"...
2 Oct 2025
Biztonsági szemle
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.
2 Oct 2025
Biztonsági szemle
Building a Digital Backbone: How States Can Modernize Rural Healthcare with RHTP Funding
Discover how states can leverage $50 billion in federal funding to modernize rural healthcare through secure, scalable digital infrastructure—and why timely action is critical to transform care for millions.
2 Oct 2025
Biztonsági szemle
Zero Trust: The Foundation of Industrial Cyber Defense
Zero trust architecture reduces industrial cyber risks. Learn how Cisco helps secure OT networks at scale without disrupting production.
2 Oct 2025
Biztonsági szemle
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
2 Oct 2025
Biztonsági szemle
Android Spyware in the UAE Masquerades as ... Spyware
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.
Pagination
- Previous page ‹‹
- Page 48
- Next page ››