Biztonsági szemle
2024. Szep. 26.
Biztonsági szemle
ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises
Today, the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), the Cybersecurity and Infrastructure Security Agency (CISA), and other U.S. and international partners released the joint guide Detecting and Mitigating Active...
2024. Szep. 26.
Biztonsági szemle
Advantech ADAM-5630
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5630 Vulnerabilities: Use of Persistent Cookies Containing Sensitive Information 2. RISK EVALUATION Successful exploitation of this...
2024. Szep. 26.
Biztonsági szemle
goTenna Pro ATAK Plugin
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Low attack complexity Vendor: goTenna Equipment: Pro ATAK Plugin Vulnerabilities: Weak Password Requirements, Insecure Storage of Sensitive Information, Missing Support for Integrity Check...
2024. Szep. 26.
Biztonsági szemle
Cisco Releases Security Updates for IOS and IOS XE Software
Cisco released its September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication to address vulnerabilities in IOS and IOS XE. A cyber threat actor could exploit some of these vulnerabilities to take control of an...
2024. Szep. 26.
Biztonsági szemle
Why SBOMs are not enough to manage modern software risks
SBOMs offer great insight into the software supply chain, but it takes strong controls to make the code secure. .
2024. Szep. 26.
Biztonsági szemle
GenAI Writes Malicious Code to Spread AsyncRAT
Researchers have uncovered one of the first examples of threat actors using artificial intelligence chatbots for malware creation, in a phishing attack spreading the open source remote access Trojan.
2024. Szep. 26.
Biztonsági szemle
'SloppyLemming' APT Abuses Cloudflare Service in Pakistan Attacks
Who needs advanced malware when you can take advantage of a bunch of OSS tools and free cloud services to compromise your target?
2024. Szep. 26.
Biztonsági szemle
ISC Stormcast For Thursday, September 26th, 2024 https://isc.sans.edu/podcastdetail/9154, (Thu, Sep 26th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2024. Szep. 26.
Biztonsági szemle
OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary], (Wed, Sep 25th)
[This is a Guest Diary by Thomas Spangler, an ISC intern as part of the SANS.edu BACS program]
2024. Szep. 26.
Biztonsági szemle
NIST Drops Password Complexity, Mandatory Reset Rules
The latest draft version of NIST's password guidelines simplifies password management best practices and eliminates those that did not promote stronger security.
2024. Szep. 26.
Biztonsági szemle
Ivanti vTM flaw added to Known Exploited Vulnerabilities catalog
Attackers can remotely add rogue admin accounts using the authentication bypass flaw.
2024. Szep. 25.
Biztonsági szemle
Chinese hackers build massive IoT botnet, feds warn
The FBI, NSA and CNMF joined forces to warn the public of a looming threat posed by a massive botnet.
Oldalszámozás
- Előző oldal ‹‹
- 576. oldal
- Következő oldal ››