Biztonsági szemle

2025. Jan. 30.
Biztonsági szemle
Zyxel zero-day flaw actively being exploited
Cybersecurity researchers at GreyNoise warned that threat intelligence data indicates attack attempts originating from dozens of IP addresses, primarily from Taiwan, with over 1,500 vulnerable devices detected online.

2025. Jan. 30.
Biztonsági szemle
DogWifTools breached in supply-chain attack on cryptocurrency wallets
The attackers were able to access the project's private GitHub repository by reverse engineering the software and extracting a GitHub token.

2025. Jan. 30.
Biztonsági szemle
Customer Experience is set to Go Beyond at Cisco Live Amsterdam
See what's on tap from the Customer Experience (CX) team at Cisco Live Amsterdam 2025.

2025. Jan. 30.
Biztonsági szemle
DeepSeek AI platform exposed user data through unsecured database
Researchers from cloud security firm Wiz discovered the issue and attempted to contact DeepSeek through multiple channels.

2025. Jan. 30.
Biztonsági szemle
Lazarus Group found using web-based admin panel for campaign management
Based on reporting from SecurityScorecard's STRIKE team, the North Korean state-backed threat actor employs a React and Node.js-based system in each C2 server to enable centralized management of stolen data, observation of compromised hosts, and...

2025. Jan. 30.
Biztonsági szemle
Exposure Management Provider CYE Acquires Solvo
The addition of Solvo CSPM to CYE Hyver aims to address need for multicloud vulnerability monitoring and risk assessment.

2025. Jan. 30.
Biztonsági szemle
2025: Connecting Everything with Cisco’s Mobility Services Platform
By partnering with Cisco and harnessing the power of our Mobility Services Platform, CSPs elevate their connectivity to deliver end-to-end enterprise value and use cases that solve real-world business problems.

2025. Jan. 30.
Biztonsági szemle
Top Threat Tactics and How to Address Them
See the key takeaways for the most recent Cisco Talos Incident Response report and learn how you can use Cisco Security products to help defend against these.

2025. Jan. 30.
Biztonsági szemle
How the Rise of GenAI is Disrupting a Delicate Balance Between Innovation and Data Security
Rogue AI models are exposing sensitive data without regulation, creating an environment for accidentaldata breaches and misuse.
2025. Jan. 30.
Biztonsági szemle
New Rock Technologies Cloud Connected Devices
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: New Rock Technologies Equipment: Cloud Connected Devices Vulnerabilities: Improper Neutralization of Special Elements used in an OS Command ('OS...
2025. Jan. 30.
Biztonsági szemle
Hitachi Energy UNEM
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: UNEM Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Argument Injection, Heap-based Buffer...
2025. Jan. 30.
Biztonsági szemle
CISA Releases Eight Industrial Control Systems Advisories
CISA released eight Industrial Control Systems (ICS) advisories on January 30, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-030-01 Hitachi Energy UNEM ICSA-25...
Oldalszámozás
- Előző oldal ‹‹
- 311. oldal
- Következő oldal ››