Biztonsági szemle

2025. Jan. 30.
Biztonsági szemle
Three lessons learned from DeepSeek and this week's market meltdown
The AI market was due for a correction – now we need to proceed with caution and find out what’s really going on.

2025. Jan. 30.
Biztonsági szemle
New Jailbreaks Allow Users to Manipulate GitHub Copilot
Whether by intercepting its traffic or just giving it a little nudge, GitHub's AI assistant can be made to do malicious things it isn't supposed to.

2025. Jan. 30.
Biztonsági szemle
Automated Pen Testing Is Improving — Slowly
The rate of evolution has been glacial, but tools now understand cloud environments and can target Web applications.

2025. Jan. 30.
Biztonsági szemle
Industry groups push for federal data privacy legislation
In a letter sent to Congressional leaders, the organizations argued that a national privacy standard would benefit businesses by reducing regulatory complexity and promoting competition, which could lower costs and increase consumer access.

2025. Jan. 30.
Biztonsági szemle
Tenable to acquire Vulcan Cyber for $150M
The deal comprises $147 million in cash and $3 million in restricted stock units and is expected to close by the end of March.

2025. Jan. 30.
Biztonsági szemle
Zyxel zero-day flaw actively being exploited
Cybersecurity researchers at GreyNoise warned that threat intelligence data indicates attack attempts originating from dozens of IP addresses, primarily from Taiwan, with over 1,500 vulnerable devices detected online.

2025. Jan. 30.
Biztonsági szemle
DogWifTools breached in supply-chain attack on cryptocurrency wallets
The attackers were able to access the project's private GitHub repository by reverse engineering the software and extracting a GitHub token.

2025. Jan. 30.
Biztonsági szemle
DeepSeek AI platform exposed user data through unsecured database
Researchers from cloud security firm Wiz discovered the issue and attempted to contact DeepSeek through multiple channels.

2025. Jan. 30.
Biztonsági szemle
Lazarus Group found using web-based admin panel for campaign management
Based on reporting from SecurityScorecard's STRIKE team, the North Korean state-backed threat actor employs a React and Node.js-based system in each C2 server to enable centralized management of stolen data, observation of compromised hosts, and...

2025. Jan. 30.
Biztonsági szemle
Exposure Management Provider CYE Acquires Solvo
The addition of Solvo CSPM to CYE Hyver aims to address need for multicloud vulnerability monitoring and risk assessment.

2025. Jan. 30.
Biztonsági szemle
How the Rise of GenAI is Disrupting a Delicate Balance Between Innovation and Data Security
Rogue AI models are exposing sensitive data without regulation, creating an environment for accidentaldata breaches and misuse.

2025. Jan. 30.
Biztonsági szemle
Fake Videos of Former First Lady Scam Namibians
Amateurish financial scams are common across Africa, and Namibia's influential former first lady, Monica Geingos, has emerged as a particularly effective host body for these messages.
Oldalszámozás
- Előző oldal ‹‹
- 214. oldal
- Következő oldal ››