Biztonsági szemle

2025. Jún. 27.
Biztonsági szemle
Top Apple, Google VPN Apps May Help China Spy on Users
Apple and Google espouse strong values about data privacy, but they allow programs from a Big Brother state to thrive on their app stores, researchers allege.

2025. Jún. 27.
Biztonsági szemle
MacOS malware Poseidon Stealer rebranded as Odyssey Stealer
Malicious AppleScript distributed via ClickFix exfiltrates Keychain credentials, browser data and more.

2025. Jún. 27.
Biztonsági szemle
MOVEit Transfer systems scans jump significantly
Spike potentially AI-fueled, but experts say it could be an opportunity to learn more faster about the hackers’ intentions.

2025. Jún. 27.
Biztonsági szemle
'CitrixBleed 2' Shows Signs of Active Exploitation
If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, all while remaining undetected.

2025. Jún. 27.
Biztonsági szemle
AI won’t save identity if it can’t tell a dog’s paw from a fingerprint
At Identiverse 2025, Protect AI CISO Diana Kelley warned that artificial intelligence may be powerful, but it’s not always right. When it comes to identity, hallucinations can be dangerous — and trust must be earned.

2025. Jún. 27.
Biztonsági szemle
Scattered Spider Taps CFO Credentials in 'Scorched Earth' Attack
In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and Snowflake environments, and for the first known time, actively fought back against incident response...

2025. Jún. 27.
Biztonsági szemle
UK hacker 'IntelBroker' to face charges in the US
Department of Justice indicts 25 year-old UK resident behind "IntelBroker" identity behind 40-plus cases.

2025. Jún. 27.
Biztonsági szemle
Hackers Make Hay? Smart Tractors Vulnerable to Full Takeover
Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks to poor security in an aftermarket steering system.

2025. Jún. 27.
Biztonsági szemle
From GOAT to game plan: What 18 months of cloud pentesting reveal
Insights from 18 months of cloud pentests reveal consistent failure patterns—and how security teams can evolve from checklist-driven practices to attacker-informed defense.

2025. Jún. 27.
Biztonsági szemle
Vulnerability Debt: How Do You Put a Price on What to Fix?
Putting a vulnerability debt figure together involves work, but having vulnerability debt figures lets you measure real-world values against your overall security posture.

2025. Jún. 27.
Biztonsági szemle
Cloud pentesting is the new baseline for real resilience
Traditional security audits aren’t enough—cloud pentesting provides the real-world validation modern environments need to uncover dangerous blind spots and reduce risk. Here's how.

2025. Jún. 27.
Biztonsági szemle
US Falling Behind China in Exploit Production
Cyber operations have become critical to national security, but the United States has fallen behind in one significant area — exploit production — while China has built up a significant lead.
Oldalszámozás
- Előző oldal ‹‹
- 12. oldal
- Következő oldal ››