Biztonsági szemle

2025. Jún. 2.
Biztonsági szemle
Massive TikTok breach claimed to compromise 428M users
Included in the stolen dataset were individuals' email addresses, mobile numbers, TikTok user IDs, usernames, nicknames, biographies, avatar URLs, profile links, account flags, and other metrics, according to Often9.

2025. Jún. 2.
Biztonsági szemle
Widespread Linux password hash theft likely with new bugs
While the Canonical apport package flaw, tracked as CVE-2025-5054, could be leveraged to facilitate data leaks through PID-reuse, the systemd-coredump bug, tracked as CVE-2025-4598, could be abused to force crash a SUID process that would be replaced...

2025. Jún. 2.
Biztonsági szemle
Beyond the Broken Wall: Why the Security Perimeter Is Not Enough
Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.

2025. Jún. 2.
Biztonsági szemle
In the AI Race With China, Don't Forget About Security
The US needs to establish a clear framework to provide reasonable guardrails to protect its interests — the quicker, the better.

2025. Jún. 2.
Biztonsági szemle
Streamline Regulation Mandates With NIST CSF and Secure Workload
Cisco Secure Workload serves as a foundational solution for organizations seeking to implement an effective microsegmentation strategy.

2025. Jún. 2.
Biztonsági szemle
Redefining Infrastructure Strategy for a Fragmented, Hybrid Future
Flexibility, collaboration, and modularity are defining the next wave of enterprise IT Enterprise infrastructure strategy is entering a new phase—one where the goal is no longer just centralization or consolidation, but intelligent distribution. IT...
2025. Jún. 2.
Biztonsági szemle
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-32030 ASUS Routers Improper Authentication Vulnerability CVE-2023-39780 ASUS RT-AX55 Routers OS Command...

2025. Jún. 2.
Biztonsági szemle
ISC Stormcast For Monday, June 2nd, 2025 https://isc.sans.edu/podcastdetail/9474, (Mon, Jun 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Jún. 2.
Biztonsági szemle
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Eyal Benishti, Chris Peluso, Chad Alessi, Tony Anscombe, Karl Van den Bergh, Nick Carroll - ESW #409

2025. Jún. 2.
Biztonsági szemle
Malware elleni védekezés: a láthatatlan ellenség– SANS OUCH! – 2025. június
Megjelent a SANS és a Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet közös kiadványának 2025. júniusi száma, melyben bemutatjuk azt a rosszindulatú szoftvert (malware), amely lehetővé teszi a kiberbűnözők számára, hogy hozzáférjenek...

2025. Jún. 2.
Biztonsági szemle
Simple SSH Backdoor, (Mon, Jun 2nd)
For most system and network administrators, the free SSH client Putty has been their best friend for years! This tool was also (ab)used by attackers that deployed a trojanized version[ 1]. Microsoft had the good idea to include OpenSSH (beta version)...

2025. Jún. 1.
Biztonsági szemle
YARA 4.5.3 Release, (Sun, Jun 1st)
YARA 4.5.3 was released with 5 bugfixes.
Oldalszámozás
- Előző oldal ‹‹
- 56. oldal
- Következő oldal ››