Biztonsági szemle

2025. Aug. 5.
Biztonsági szemle
Why the Old Ways Are Still the Best for Most Cybercriminals
While the cybercrime underground has professionalized and become more organized in recent years, threat actors are, to a great extent, still using the same attack methods today as they were in 2020.

2025. Aug. 5.
Biztonsági szemle
Minimal, Hardened, and Updated Daily: The New Standard for Secure Containers
Chainguard provides DevSecOps teams with a library of "secure-by-default" container images so that they don't have to worry about software supply chain vulnerabilities. The startup is expanding its focus to include Java and Linux, as well.

2025. Aug. 4.
Biztonsági szemle
Nvidia Patches Critical RCE Vulnerability Chain
The flaws in the company's Triton Inference Server enables model theft, data leaks, and response manipulation.

2025. Aug. 4.
Biztonsági szemle
CISA & FEMA Announce $100M+ in Community Cybersecurity Grants
The grants are intended to help states, tribes, and localities enhance their cybersecurity resilience by providing them with monetary resources to reduce risks and implement new procedures.

2025. Aug. 4.
Biztonsági szemle
MacOS Under Attack: How Organizations Can Counter Rising Threats
Not only are attacks against macOS users ramping up, but threat actors have proved to be advanced with deepfake technology. Security awareness training may be the best defense.

2025. Aug. 4.
Biztonsági szemle
Threat Actors Increasingly Leaning on GenAI Tools
From "eCrime" actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations.

2025. Aug. 4.
Biztonsági szemle
42% of Developers Using AI Say Their Codebase is Now Mostly AI-Generated

2025. Aug. 4.
Biztonsági szemle
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation.

2025. Aug. 4.
Biztonsági szemle
Turning Human Vulnerability Into Organizational Strength
Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and the deployment of layered technical controls.

2025. Aug. 2.
Biztonsági szemle
What Is the Role of Provable Randomness in Cybersecurity?
Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it's equally important to examine the randomness underpinning them
Oldalszámozás
- 1. oldal
- Következő oldal ››