Biztonsági szemle
2026. Aug. 6.
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.
2025. Nov. 26.
Biztonsági szemle
Iran Exploits Cyber Domain to Aid Kinetic Strikes
The country deploys "cyber-enabled kinetic targeting" prior to — and following — real-world missile attacks against ships and land-based targets.
2025. Nov. 25.
Biztonsági szemle
Advanced Security Isn't Stopping Ancient Phishing Tactics
New research reveals that sophisticated phishing attacks consistently bypass traditional enterprise security measures.
2025. Nov. 25.
Biztonsági szemle
Cheap Hardware Module Bypasses AMD, Intel Memory Encryption
Researchers built an inexpensive device that circumvents chipmakers' confidential computing protections and reveals weaknesses in scalable memory encryption.
2025. Nov. 25.
Biztonsági szemle
DPRK's FlexibleFerret Tightens macOS Grip
The actor behind the "Contagious Interview" campaign is continuing to refine its tactics and social engineering scams to wrest credentials from macOS users.
2025. Nov. 25.
Biztonsági szemle
With Friends Like These: China Spies on Russian IT Orgs
State-linked hackers stayed under the radar by using a variety of commercial cloud services for command-and-control communications.
2025. Nov. 25.
Biztonsági szemle
As Gen Z Enters Cybersecurity, Jury Is Out on AI's Impact
Despite possibly supplanting some young analysts, one Gen Z cybersecurity specialist sees AI helping teach those willing to learn and removing drudge work.
2025. Nov. 25.
Biztonsági szemle
'JackFix' Attack Circumvents ClickFix Mitigations
A new ClickFix variant ratchets up the psychological pressure to 100 and addresses some technical mitigations to classic ClickFix attacks.
2025. Nov. 24.
Biztonsági szemle
ShadowRay 2.0 Turns AI Clusters into Crypto Botnets
A threat actor is leveraging a flaw in the Ray framework to hijack AI infrastructure worldwide and distribute a self-propagating cryptomining and data theft botnet.
2025. Nov. 24.
Biztonsági szemle
Critical Flaw in Oracle Identity Manager Under Exploitation
The exploitation of CVE-2025-61757 follows a breach of Oracle Cloud earlier this year as well as a recent extortion campaign targeting Oracle E-Business Suite customers.
2025. Nov. 24.
Biztonsági szemle
Infamous Shai-hulud Worm Resurfaces From the Depths
This campaign introduces a new variant that executes malicious code during preinstall, significantly increasing potential exposure in build and runtime environments, researchers said.
Oldalszámozás
- 1. oldal
- Következő oldal ››