Biztonsági szemle

2025. Feb. 4.
Biztonsági szemle
Data breach disclosed by Mizuno after BianLian claims
While malicious network activity was first identified by Mizuno in early November, further investigation revealed that the Japanese sportswear company had its systems infiltrated since August, resulting in the periodic theft of individuals' names...

2025. Feb. 4.
Biztonsági szemle
Updated Coyote malware facilitates more extensive compromise
Attacks with the new Coyote trojan variant over the past month involved the deployment of an LNK file executing a PowerShell command facilitating next-stage PowerShell script retrieval for the eventual launching of the trojan, which not only obtained...

2025. Feb. 4.
Biztonsági szemle
Some updates to our data feeds, (Tue, Feb 4th)
We have offered several different data feeds via our API or other means. However, we are often not very good at documenting what these feeds are all about. Currently, I am in the process of fixing the documentation around these data feeds.

2025. Feb. 4.
Biztonsági szemle
Managing Software Risk in a World of Exploding Vulnerabilities
Organizations and development teams need to evolve from "being prepared" to "managing the risk" of security breaches.

2025. Feb. 4.
Biztonsági szemle
AI, Security, and Your Learning Future at Cisco Live Amsterdam 2025
Get ready to immerse yourself in the heart of innovation with Learning & Certifications at Cisco Live Amsterdam 2025.

2025. Feb. 4.
Biztonsági szemle
Four Transformative Trends Shaping HR in 2025
Over my last two decades as an HR leader, I’ve had a front-row seat to the evolution of work. Since 2020, that evolution has gone into hyper-drive. AI, the rise of hybrid work, and evolving employee expectations have all played a part in what I...

2025. Feb. 4.
Biztonsági szemle
Reaching My Ultimate Goal: Cisco Live!
Follow Business Operations Analyst Andrea P.'s mentorship journey through the Women of Cisco Executive Shadow Program to Cisco Live, achieving her ultimate career goal.

2025. Feb. 4.
Biztonsági szemle
Cybersecurity for Businesses of All Sizes: A Blueprint for Protection
Developing a robust cybersecurity practice involves implementing multiple layers of security measures that are interconnected and continually monitored.
2025. Feb. 4.
Biztonsági szemle
Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC Vulnerability: Incorrect Calculation of Buffer Size 2. RISK...
2025. Feb. 4.
Biztonsági szemle
CISA Releases Nine Industrial Control Systems Advisories
CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-035-01 Western Telematic Inc NPS...
2025. Feb. 4.
Biztonsági szemle
Elber Communications Equipment
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Elber Equipment: Communications Equipment Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel...
2025. Feb. 4.
Biztonsági szemle
Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M340 and BMXNOE0100/0110, BMXNOR0200H Vulnerability: Exposure of Sensitive Information to an Unauthorized...
Oldalszámozás
- Előző oldal ‹‹
- 302. oldal
- Következő oldal ››