Biztonsági szemle
2025. Okt. 3.
Biztonsági szemle
Microsoft's Voice Clone Becomes Scary & Unsalvageable
An attacker's dream: Windows Speak for Me could integrate into apps, creating perfect voice replicas for Teams calls and AI agent interactions across multiple SaaS platforms.
2025. Okt. 3.
Biztonsági szemle
UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft
A Chinese-language threat actor uses every part of the kill: infecting Web servers with malware, poisoning sites with SEO spam, and stealing organizational data for follow-on attacks.
2025. Okt. 2.
Biztonsági szemle
There Are More CVEs, But Cyber Insurers Aren't Altering Policies
With nearly 47,000 CVEs expected by the end of the year, organizations must balance comprehensive vulnerability management with strategic cyber insurance policy selection to effectively navigate this rapidly evolving threat landscape.
2025. Okt. 2.
Biztonsági szemle
For One NFL Team, Tackling Cyber Threats Is Basic Defense
The NFL's cyberattack surface is expanding at an unprecedented rate. To find out more, we spoke with a cyber defense coordinator from the Cleveland Browns.
2025. Okt. 2.
Biztonsági szemle
Red Hat Investigates Widespread Breach of Private GitLab Repositories
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
2025. Okt. 2.
Biztonsági szemle
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.
2025. Okt. 2.
Biztonsági szemle
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
2025. Okt. 2.
Biztonsági szemle
Android Spyware in the UAE Masquerades as ... Spyware
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.
2025. Okt. 1.
Biztonsági szemle
Google Sheds Light on ShinyHunters' Salesforce Tactics
Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.
2025. Okt. 1.
Biztonsági szemle
Shutdown Threatens US Intel Sharing, Cyber Defense
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.
2025. Okt. 1.
Biztonsági szemle
A $50 'Battering RAM' Can Bust Confidential Computing
Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.
2025. Okt. 1.
Biztonsági szemle
Undead Operating Systems Haunt Enterprise Security Networks
Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.
Oldalszámozás
- Előző oldal ‹‹
- 11. oldal
- Következő oldal ››