Biztonsági szemle
2025. Aug. 19.
Biztonsági szemle
'RingReaper' Sneaks Right Past Linux EDRs
The highly sophisticated post-compromise tool abuses the Linux kernel's io_uring interface to remain hidden from endpoint detection and response systems.
2025. Aug. 19.
Biztonsági szemle
AI Agents Access Everything, Fall to Zero-Click Exploit
Zenity CTO Michael Bargury joins the Black Hat USA 2025 News Desk to discuss research on a dangerous exploit, how generative AI technology has "grown arms and legs" —and what that means for cyber risk.
2025. Aug. 19.
Biztonsági szemle
Millions Allegedly Affected in Allianz Insurance Breach
Have I Been Pwned claims that the compromised data includes physical addresses, dates of birth, phone numbers, and more, for life insurance customers.
2025. Aug. 19.
Biztonsági szemle
PipeMagic Backdoor Resurfaces as Part of Play Ransomware Attack Chain
Attackers are wielding the sophisticated modular malware while exploiting CVE-2025-29824, a previously zero-day flaw in Windows Common Log File System (CLFS) that allows attackers to gain system-level privileges on compromised systems.
2025. Aug. 19.
Biztonsági szemle
10 Major GitHub Risk Vectors Hidden in Plain Sight
By addressing these overlooked risk vectors, organizations can continue leveraging GitHub's innovation while protecting against sophisticated supply chain attacks targeting interconnected software.
2025. Aug. 19.
Biztonsági szemle
'DripDropper' Hackers Patch Their Own Exploit
An attacker is breaking into Linux systems via a widely abused 2-year-old vulnerability in Apache ActiveMQ, installing malware and then patching the flaw.
2025. Aug. 19.
Biztonsági szemle
Secure AI Use Without the Blind Spots
Why every company needs a clear, enforceable AI policy — now.
2025. Aug. 18.
Biztonsági szemle
Noodlophile Stealer Hides Behind Bogus Copyright Complaints
Noodlophile is targeting enterprises in spear-phishing attacks using copyright claims as phishing lures.
2025. Aug. 18.
Biztonsági szemle
Workday Breach Likely Linked to ShinyHunters Salesforce Attacks
The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; only "commonly available" business contact info was exposed.
2025. Aug. 18.
Biztonsági szemle
How Evolving RATs Are Redefining Enterprise Security Threats
A more unified and behavior-aware approach to detection can significantly improve security outcomes.
2025. Aug. 18.
Biztonsági szemle
Internet-wide Vulnerability Enables Giant DDoS Attacks
A good chunk of all websites today have been affected by the biggest DDoS risk on the Web since 2023.
2025. Aug. 18.
Biztonsági szemle
Defending Against Cloud Threats Across Multicloud Environments
The vast majority of companies are using more than one cloud platform, yet struggle to establish and monitor security across different environments giving attackers an opening.
Oldalszámozás
- Előző oldal ‹‹
- 43. oldal
- Következő oldal ››