Biztonsági szemle

2025. Ápr. 24.
Biztonsági szemle
Black Hat Asia 2025: Innovation in the SOC
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
2025. Ápr. 24.
Biztonsági szemle
Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: iSTAR Configuration Utility (ICU) Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful...
2025. Ápr. 24.
Biztonsági szemle
Planet Technology Network Products
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Planet Technology Equipment: Planet Technology Network Products Vulnerabilities: Improper Neutralization of Special Elements used in an OS...
2025. Ápr. 24.
Biztonsági szemle
ALBEDO Telecom Net.Time - PTP/NTP Clock
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: ALBEDO Telecom Equipment: Net.Time - PTP/NTP clock Vulnerability: Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of...
2025. Ápr. 24.
Biztonsági szemle
Nice Linear eMerge E3
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Nice Equipment: Linear eMerge E3 Vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 2...
2025. Ápr. 24.
Biztonsági szemle
Schneider Electric Modicon Controllers
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum Vulnerabilities: Trust Boundary Violation...
2025. Ápr. 24.
Biztonsági szemle
Vestel AC Charger
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Vestel Equipment: AC Charger Vulnerability: Exposure of Sensitive System Information to an Unauthorized Control Sphere 2. RISK EVALUATION...
2025. Ápr. 24.
Biztonsági szemle
CISA Releases Seven Industrial Control Systems Advisories
CISA released seven Industrial Control Systems (ICS) advisories on April 24, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-114-01 Schneider Electric Modicon...

2025. Ápr. 24.
Biztonsági szemle
3 ways to build a ransomware IR strategy that works
Here’s where companies fail with ransomware response plans – and how to develop ones that work.

2025. Ápr. 24.
Biztonsági szemle
Crisis Response Community volunteers know what it takes to stay connected
Cisco Crisis Response Community volunteers recently gathered to reflect on their training and talk about why they give their time and expertise.

2025. Ápr. 24.
Biztonsági szemle
Five Empowering Tips for ICT Career Success
The path to a career in technology isn’t always easy, and I know this firsthand. I didn’t grow up dreaming of a tech career. I stepped into it out of necessity to support my family. My parents were cleaners, and by the time I was 13, I was helping...

2025. Ápr. 24.
Biztonsági szemle
ISC Stormcast For Thursday, April 24th, 2025 https://isc.sans.edu/podcastdetail/9422, (Thu, Apr 24th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Oldalszámozás
- Előző oldal ‹‹
- 133. oldal
- Következő oldal ››