Biztonsági szemle
2025. Jan. 23.
Biztonsági szemle
Schneider Electric Easergy Studio
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: Easergy Studio Vulnerability: Improper Privilege Management 2. RISK EVALUATION Successful exploitation of this vulnerability may risk...
2025. Jan. 23.
Biztonsági szemle
Schneider Electric EVlink Home Smart and Schneider Charge
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.5 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: EVlink Home Smart and Schneider Charge Vulnerability: Cleartext Storage of Sensitive Information 2. RISK EVALUATION Successful...
2025. Jan. 23.
Biztonsági szemle
HMS Networks Ewon Flexy 202
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Low attack complexity Vendor: HMS Networks Equipment: Ewon Flexy 202 Vulnerability: Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of this vulnerability...
2025. Jan. 23.
Biztonsági szemle
Hitachi Energy RTU500 Series Product
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: RTU500 series products Vulnerability: Improperly Implemented Security Check for Standard 2. RISK EVALUATION Successful...
2025. Jan. 23.
Biztonsági szemle
CISA Releases Six Industrial Control Systems Advisories
CISA released six Industrial Control Systems (ICS) advisories on January 23, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-023-01 mySCADA myPRO Manager ICSA-25...
2025. Jan. 23.
Biztonsági szemle
ISC Stormcast For Thursday, January 23rd, 2025 https://isc.sans.edu/podcastdetail/9292, (Wed, Jan 22nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. Jan. 23.
Biztonsági szemle
Doti AI Launches Platform to Securely Find Enterprise Data
The AI-powered work platform helps organizations securely identify and access internal enterprise data as part of business processes and workflows.
2025. Jan. 22.
Biztonsági szemle
Security Needs to Start Saying 'No' Again
The rush to say "yes" allows cybersecurity teams to avoid hard conversations with business stakeholders but also risks losing their ability to effectively protect organizations.
2025. Jan. 22.
Biztonsági szemle
Trump Overturns Biden Rules on AI Development, Security
The new administration moved quickly to remove any constraints on AI development and collected $500 billion in investment pledges for an American-owned AI joint venture.
2025. Jan. 22.
Biztonsági szemle
The Future Of The CISO - Part 2 - Jess Burn, Jeff Pollard - BSW #379
2025. Jan. 22.
Biztonsági szemle
Optimizing AI Workloads with NVIDA GPUs, Time Slicing, and Karpenter (Part 2)
Introduction: Overcoming GPU Management Challenges In Part 1 of this blog series, we explored the challenges of hosting large language models (LLMs) on CPU-based workloads within an EKS cluster. We discussed the inefficiencies associated with using...
2025. Jan. 22.
Biztonsági szemle
Chinese Cyberspies Target South Korean VPN in Supply Chain Attack
Advanced persistent threat group PlushDaemon, active since 2019, is using a sophisticated modular backdoor to collect data from infected systems in South Korea.
Oldalszámozás
- Előző oldal ‹‹
- 391. oldal
- Következő oldal ››