Biztonsági szemle
2024. Szep. 26.
Biztonsági szemle
Novel Splinter post-exploitation tool examined
Aside from performing Windows command execution and remote process injection-based module implementation, Splinter — which has "exceptionally large" artifact sizes due to extensive Rust crate presence — also features file uploading and downloading...
2024. Szep. 26.
Biztonsági szemle
Microsoft 365 credentials targeted by TikTok URL-based phishing
Attacks commence with the distribution of malicious emails purporting to be an Office 365 alert luring recipients to cancel a request for inbox email deletion through a button that contains the TikTok URL, according to a Cofense Phishing Defense...
2024. Szep. 26.
Biztonsági szemle
US ISPs targeted by new Chinese cyberespionage gang
Novel Chinese cyberespionage operation Salt Typhoon was reported by The Wall Street Journal to have compromised several internet service providers across the U.S. in attacks, which its sources noted were in preparation for imminent cyber intrusions.
2024. Szep. 26.
Biztonsági szemle
Global DragonForce attacks involve custom Conti, LockBit ransomware
Intrusions conducted by DragonForce, which has been suspected to be based in Malaysia, also involved the deployment of the SystemBC backdoor and the Mimikatz and Cobalt Strike tools to facilitate further compromise to advance its double extortion...
2024. Szep. 26.
Biztonsági szemle
CISA: Ongoing critical infrastructure OT/ICS device attacks involve unsophisticated techniques
Ongoing targeting of vulnerable OT/ICS devices should prompt critical infrastructure entities to replace default passwords, activate multi-factor authentication, implement firewall protection for human-machine interfaces, and ensure up-to-date...
2024. Szep. 26.
Biztonsági szemle
How to securely deploy GenAI applications at scale
Integrating generative AI into your business model creates new risks as well as new rewards. Here's how to counter those risks.
2024. Szep. 26.
Biztonsági szemle
Atelmo Atemio AM 520 HD Full HD Satellite Receiver
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Atelmo Equipment: Atemio AM 520 HD Full HD Satellite Receiver Vulnerability: OS Command Injection 2. RISK...
2024. Szep. 26.
Biztonsági szemle
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on September 26, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-270-01 Advantech ADAM-5550 ICSA-24...
2024. Szep. 26.
Biztonsági szemle
Advantech ADAM-5550
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5550 Vulnerabilities: Weak Encoding for Password, Cross-site Scripting 2. RISK EVALUATION Successful exploitation of these vulnerabilities...
2024. Szep. 26.
Biztonsági szemle
goTenna Pro X and Pro X2
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: goTenna Equipment: Pro series Vulnerabilities: Weak Password Requirements, Insecure Storage of Sensitive Information, Missing Support for Integrity Check, Cleartext...
2024. Szep. 26.
Biztonsági szemle
ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises
Today, the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), the Cybersecurity and Infrastructure Security Agency (CISA), and other U.S. and international partners released the joint guide Detecting and Mitigating Active...
2024. Szep. 26.
Biztonsági szemle
Advantech ADAM-5630
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5630 Vulnerabilities: Use of Persistent Cookies Containing Sensitive Information 2. RISK EVALUATION Successful exploitation of this...
Oldalszámozás
- Előző oldal ‹‹
- 575. oldal
- Következő oldal ››