Security Bulletin

5 Jun 2025
Biztonsági szemle
Cybersecurity Training in Africa Aims to Bolster Professionals' Ranks
The United Nations, Carnegie Mellon University, and private organizations are all aiming to train the next generation of cybersecurity experts, boost economies, and disrupt pipelines to armed groups.

5 Jun 2025
Biztonsági szemle
ISC Stormcast For Thursday, June 5th, 2025 https://isc.sans.edu/podcastdetail/9480, (Thu, Jun 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

5 Jun 2025
Biztonsági szemle
PKI, IAM and the crypto-agility trust imperative
DigiCert's Ashley Stevenson explores why unifying PKI and IAM is essential to closing identity-related trust gaps.

5 Jun 2025
Biztonsági szemle
Open-source Chaos RAT used in recent attacks targeting Linux
The free remote administration tool enables reverse shell access, file management and command execution.

4 Jun 2025
Biztonsági szemle
35K Solar Devices Vulnerable to Potential Hijacking
A little more than three-quarters of these exposed devices are located in Europe, followed by Asia, with 17%.

4 Jun 2025
Biztonsági szemle
Lumos touts 'Albus' as first AI agent for autonomous identity governance
New AI multi-agent system to assist organizations in scaling up identity governance and administration.

4 Jun 2025
Biztonsági szemle
Vishing Crew Targets Salesforce Data
A group Google is tracking as UNC6040 has been tricking users into installing a malicious version of a Salesforce app to gain access to and steal data from the platform.

4 Jun 2025
Biztonsági szemle
From password pains to productivity gains: Modern access, real results
Imprivata's Chip Hughes discusses how outdated methods create friction, increase risk, and undermine compliance.

4 Jun 2025
Biztonsági szemle
Vishing Crew Targets Salesforce Data
A group that Google is tracking as UNC6040 has been tricking users at many organizations into installing a malicious version of a Salesforce app to gain access and steal data from the platform.

4 Jun 2025
Biztonsági szemle
Open-source code repos open to supply chain attacks, researchers warn
Multiple malicious packages were discovered on npm, PyPI and RubyGems repositories.

4 Jun 2025
Biztonsági szemle
File security best practices in banking: Protecting digital assets in a complex threat landscape
During a recent SC Media webcast, OPSWAT's George Prichici discussed the critical importance of comprehensive file security strategies for financial institutions, highlighting the need for advanced threat detection, sanitization, and integration...

4 Jun 2025
Biztonsági szemle
How Neuroscience Can Help Us Battle 'Alert Fatigue'
By understanding the neurological realities of human attention, organizations can build more sustainable security operations that protect not only their digital assets but also the well-being of those who defend them.
Pagination
- Previous page ‹‹
- Page 49
- Next page ››