Biztonsági szemle
2026. április 22.
Biztonsági szemle
DPRK Fake Job Scams Self-Propagate in 'Contagious Interview'
A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware.
2026. április 22.
Biztonsági szemle
Electricity Is a Growing Area of Cyber Risk
IT has long been concerned about ensuring systems receive the right amount of electricity. Cyberattackers are realizing they can manipulate voltage fluctuations for their purposes, too.
2026. április 21.
Biztonsági szemle
Ransomware Negotiator Pleads Guilty to BlackCat Scheme
A cautionary tale illustrates why the person negotiating should never be involved with any part of the ransom payment process, experts noted.
2026. április 21.
Biztonsági szemle
Exploits Turn Windows Defender into Attacker Tool
Three proof-of-concept exploits are being used in active attacks against Microsoft's built-in security platform; two are unpatched.
2026. április 21.
Biztonsági szemle
Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk
The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.
2026. április 21.
Biztonsági szemle
Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool
The prompt injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that allowed for sandbox escape and arbitrary code execution.
2026. április 21.
Biztonsági szemle
Chinese APT Targets Indian Banks, Korean Policy Circles
China is spying on India's financial sector, for some reason, and it's not putting much effort into it, judging by some stale TTPs.
2026. április 20.
Biztonsági szemle
Vercel Employee's AI Tool Access Led to Data Breach
Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a researcher noted.
2026. április 20.
Biztonsági szemle
Serial-to-IP Devices Hide Thousands of Old and New Bugs
The OT devices that translate machine talk into Internet-speak are riddled with vulnerabilities and more frequently targeted for attacks, researchers say.
2026. április 20.
Biztonsági szemle
WhatsApp Leaks User Metadata to Attackers
Strangers can infer limited info about you without knowing or messaging you, which could theoretically aid certain kinds of malicious activity.
2026. április 17.
Biztonsági szemle
How NIST's Cutback of CVE Handling Impacts Cyber Teams
Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data enrichment.
2026. április 17.
Biztonsági szemle
Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
Oldalszámozás
- Előző oldal ‹‹
- 4. oldal
- Következő oldal ››