Security Bulletin

13 May 2025
Biztonsági szemle
Your cloud is only as strong as its weakest link: How full mesh SASE closes hidden security gaps
Cloud adoption has transformed how businesses operate—but it’s also introduced new risks. From fragmented connectivity to poor visibility, traditional network architectures are full of blind spots. Harmony SASE’s full mesh design offers a smarter...

13 May 2025
Biztonsági szemle
The hidden costs of legacy security stacks—and how to reclaim your budget
How to identify hidden costs and unlock new value through modern, cloud-based security strategies.

13 May 2025
Biztonsági szemle
CIOs grapple with budget pressures: New playbook offers fresh take on network security ROI
With security budgets under strain and complexity on the rise, CIOs are rethinking how they measure the true cost—and value—of network protection.

13 May 2025
Biztonsági szemle
DeepSeek, Deep Research Mean Deep Changes for AI Security
Why securing the inference chain is now the top priority for AI applications and infrastructure.

13 May 2025
Biztonsági szemle
Mainframe security: Identifying threats, vulnerabilities and risk mitigation strategies
Experts discuss the critical importance of proactive mainframe security, emphasizing education, regular assessments, and comprehensive vulnerability management to protect mission-critical systems that power global financial transactions.

13 May 2025
Biztonsági szemle
Datadog raises forecast after Q1 revenue beat
Datadog reported $761.6 million in revenue for Q1 2025, a 25% year-over-year increase that beat analyst projections of $741.5 million.

13 May 2025
Biztonsági szemle
MFA circumvented through legacy login flaw
Cybersecurity firm Guardz reported that between March 18 and April 7, 2025, attackers used the outdated BAV2ROPC protocol, which bypasses MFA and modern protections by enabling non-interactive logins through basic credentials.

13 May 2025
Biztonsági szemle
GSA launches FedRAMP 20-X to speed up cloud approvals
Travis Howerton, former federal CTO and CEO of Redscale, explained that the update shifts more responsibility to cloud service providers by automating evidence sharing and control reporting, reducing manual oversight and paperwork.

13 May 2025
Biztonsági szemle
Cloud breaches shift toward identity exploits
The 2025 Global Threat Landscape Report shows cloud breaches now commonly begin with over-permissioned accounts, credential leaks in public code repositories, and unauthorized logins from unfamiliar geographies.

13 May 2025
Biztonsági szemle
Geopolitical risks drive cloud strategy reassessment
What was once a manageable trade-off for agility and innovation, such as vendor lock-in or outages, is now overshadowed by broader concerns, including data seizure and unpredictable pricing.

13 May 2025
Biztonsági szemle
Multiple Apple software defects addressed
More than 40 security flaws have been patched by Apple as part of the macOS Sequoia 15.5 update, many of which could be exploited to obtain sensitive data access, GBHackers News reports.

13 May 2025
Biztonsági szemle
ASUS DriverHub vulnerabilities fixed
Patches have been released by ASUS for a pair of security bugs impacting its DriverHub tool, which could be exploited to facilitate remote code execution, reports The Hacker News.
Pagination
- Previous page ‹‹
- Page 91
- Next page ››