Biztonsági szemle

2026. Aug. 6.
Biztonsági szemle
Startup Spotlight: Twine Security Tackles the Execution Gap
The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses multi-agent system to build AI Digital Employees.

2025. Szep. 3.
Biztonsági szemle
Varonis Acquires Email Security Provider SlashNext to Enhance BEC Defenses
Varonis plans to integrate SlashNext's advanced phishing, BEC, and social engineering attack protection capabilities into its data security platform.

2025. Szep. 3.
Biztonsági szemle
UAE to Implement Cyber Education Initiative
The initiative will be tailored to students and their growth in cybersecurity preparedness.

2025. Szep. 2.
Biztonsági szemle
Amazon Stymies APT29 Credential Theft Campaign
A group linked to Russian intelligence services redirected victims to fake Cloudflare verification pages and exploited Microsoft's device code authentication flow.

2025. Szep. 2.
Biztonsági szemle
WordPress Woes Continue Amid ClickFix Attacks, TDS Threats
Vulnerable and malicious plug-ins are giving threat actors the ability to compromise WordPress sites and use them as a springboard to a variety of cyber threats and scams.

2025. Szep. 2.
Biztonsági szemle
Zscaler, Palo Alto Networks Breached via Salesloft Drift
Two major security firms suffered downstream compromises as part of a large-scale supply chain attack involving Salesloft Drift, a marketing SaaS application.

2025. Szep. 2.
Biztonsági szemle
Jaguar Land Rover Shuts Down in Scramble to Secure 'Cyber Incident'
The luxury automaker said its retail and production activities have been "severely disrupted."

2025. Szep. 2.
Biztonsági szemle
Hackers Are Sophisticated & Impatient — That Can Be Good
You can't negotiate with hackers from a place of fear — but you can turn their urgency against them with the right playbook, people, and preparation.

2025. Szep. 2.
Biztonsági szemle
NIST Enhances Security Controls for Improved Patching
The US National Institute of Standards and Technology released Security and Privacy Control version 5.2.0 to help organizations be more proactive regarding patching.

2025. Szep. 2.
Biztonsági szemle
JSON Config File Leaks Azure ActiveDirectory Credentials
In this type of misconfiguration, cyberattackers could use exposed secrets to authenticate directly via Microsoft’s OAuth 2.0 endpoints and infiltrate Azure cloud environments.

2025. Aug. 29.
Biztonsági szemle
An Audit Isn't a Speed Bump — It's Your Cloud Co-Pilot
Auditing must be seen for what it truly can be: a multiplier of trust, not a bottleneck of progress.
Oldalszámozás
- 1. oldal
- Következő oldal ››