Biztonsági szemle
2024. dec. 19.
Biztonsági szemle
Apple patches TCC bypass vulnerability
The vulnerability, tracked as CVE-2024-44131, was discovered in the FileProvider component and has been fixed in iOS 18, iPadOS 18, and macOS Sequoia 15 through improved validation of symbolic links.
2024. dec. 19.
Biztonsági szemle
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2
A newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since patching isn't enough to fix it.
2024. dec. 19.
Biztonsági szemle
Bridging the 'Keyboard-to-Chair' Gap With Identity Verification
Modern identity verification (IDV) approaches aim to connect digital credentials and real-world identity without sacrificing usability.
2024. dec. 19.
Biztonsági szemle
Vendors Chase Potential of Non-Human Identity Management
Non-human identities authenticate machine-to-machine communication. The big challenge now is to secure their elements and processes — before attackers can intercept.
2024. dec. 19.
Biztonsági szemle
Malvertisers Fool Google With AI-Generated Decoy Content
Seemingly innocent "white pages," including an elaborate Star Wars-themed site, are bypassing Google's malvertising filters, showing up high in search results to lure users to second-stage phishing sites.
2024. dec. 19.
Biztonsági szemle
CISA Releases Draft of National Cyber Incident Response Plan
The draft of the long-awaited update to the NCIRP outlines the efforts, mechanisms, involved parties, and decisions the US government will use in response to a large-scale cyber incident.
2024. dec. 19.
Biztonsági szemle
Supply Chain Risk Mitigation Must Be a Priority in 2025
A balance of rigorous supplier validation, purposeful data exposure, and meticulous preparation is key to managing and mitigating risk.
2024. dec. 19.
Biztonsági szemle
Six environmental sustainability trends for 2025 and beyond
At Cisco, we are steadfast in our goals to both reduce environmental impact and foster resilience—ensuring that communities, ecosystems, and industries can adapt, thrive, and sustain themselves in the face of uncertainty. Learn about six...
2024. dec. 19.
Biztonsági szemle
How weaponized AI drives CISO burnout – and what to do about it
Existing tools bury analysts in data – we need a proactive approach focused on prevention, not just detection.
2024. dec. 19.
Biztonsági szemle
Schneider Electric Modicon Controllers
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon Controllers Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this...
2024. dec. 19.
Biztonsági szemle
Hitachi Energy SDM600
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Exploitable from adjacent network Vendor: Hitachi Energy Equipment: SDM600 Vulnerabilities: Origin Validation Error, Incorrect Authorization 2. RISK EVALUATION Successful exploitation of these...
2024. dec. 19.
Biztonsági szemle
Ossur Mobile Logic Application
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.6 ATTENTION: Low attack complexity Vendor: Ossur Equipment: Mobile Logic Application Vulnerabilities: Exposure of Sensitive System Information to an Unauthorized Control Sphere, Command Injection, Use of Hard...
Oldalszámozás
- Előző oldal ‹‹
- 4. oldal
- Következő oldal ››