Security Bulletin
 
8 Aug 2025
      
            Biztonsági szemle
      
  Attackers Target the Foundations of Crypto: Smart Contracts
  A whole criminal ecosystem revolves around scamming users out of their crypto assets, but malicious — or vulnerable — smart contracts could be used against businesses as well.
      
            
      
   
8 Aug 2025
      
            Biztonsági szemle
      
  Sajtószemle – 2025. 32. hét
  A 2025. 32. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.08.01. és 2025.08.07. között kezelt incidensek statisztikai adatait is tartalmazza.
      
            
      
   
8 Aug 2025
      
            Biztonsági szemle
      
  ISC Stormcast For Friday, August 8th, 2025 https://isc.sans.edu/podcastdetail/9562, (Fri, Aug 8th)
  (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
      
            
      
   
8 Aug 2025
      
            Biztonsági szemle
      
  Silver Fox APT Blurs the Line Between Espionage & Cybercrime
  Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  Air France, KLM Alert Authorities of Data Breach
  While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  Prime Security Wins Black Hat's Startup Spotlight Competition
  Security startups of all stripes submitted applications for Black Hat USA's Startup Spotlight. Prime Security won with its AI security architect platform.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  Privilege Escalation Issue in Amazon ECS Leads to IAM Hijacking
  A software developer discovered a way to abuse an undocumented protocol in Amazon's Elastic Container Service to escalate privileges, cross boundaries and gain access to other cloud resources.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  'Samourai' Cryptomixer Founders Plead Guilty to Money Laundering
  As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  Citizen Lab Founder Flags Rise of US Authoritarianism
  Citizen Lab director and founder Ron Deibert explained how civil society is locked in "vicious cycle," and human rights are being abused as a result, covering Israeli spyware, the Khashoggi killing, and an erosion of democratic norms in the US.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  Payback: 'ShinyHunters' Clocks Google via Salesforce
  In 2024, it was Snowflake. In 2025, it's Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, Cisco, and Adidas.
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  ISC's DNSSEC Look-Aside Validation Registry
  Decommissioned as of September 30, 2017 Introduction DLV (DNSSEC Look-aside Validation) was an extension to the DNSSECbis protocol. It was designed as a transition mechanism to assist in early DNSSEC adoption by allowing DNSSEC signing and validation...
      
            
      
   
7 Aug 2025
      
            Biztonsági szemle
      
  The Critical Flaw in CVE Scoring
  With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.
      
            
      
  Pagination
- Previous page ‹‹
- Page 60
- Next page ››