Biztonsági szemle
2024. október 3.
Biztonsági szemle
China-Backed APT Group Culling Thai Government Data
CeranaKeeper is bombarding Southeast Asia with data exfiltration attacks via file-sharing services such as Pastebin, OneDrive, and GitHub, researchers say.
2024. október 3.
Biztonsági szemle
Near-'perfctl' Fileless Malware Targets Millions of Linux Servers
Armed with a staggering arsenal of at least 20,000 different exploits for various Linux server misconfigurations, perfctl is everywhere, annoying, and tough to get rid of.
2024. október 3.
Biztonsági szemle
Kickstart Your DShield Honeypot [Guest Diary], (Thu, Oct 3rd)
[This is a Guest Diary by Joshua Gilman, an ISC intern as part of the SANS.edu BACS program]
2024. október 3.
Biztonsági szemle
4 Ways to Fight AI-Based Fraud
Generative AI is being used to make cyberscams more believable. Here's how organizations can counter that using newly emerging tools and reliable methods.
2024. október 3.
Biztonsági szemle
14 DrayTek vulnerabilities patched, including max-severity RCE flaw
More than 267,000 internet-exposed routers are likely vulnerable to exploitation.
2024. október 3.
Biztonsági szemle
Zimbra email platform under active attack, RCE possible
If properly executed, the exploit would allow an attacker to obtain remote code execution on the target server.
2024. október 2.
Biztonsági szemle
North Korea's 'Stonefly' APT Swarms US Private Co's. for Profit
Despite a $10 million bounty on one member, APT45 is not slowing down, pivoting from intelligence gathering to extorting funds for Kim Jong-Un's regime.
2024. október 2.
Biztonsági szemle
NSA Releases 6 Principles of OT Cybersecurity
Organizations can use this guide to make decisions about designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as to enable business continuity for critical services.
2024. október 2.
Biztonsági szemle
Unix Printing Vulnerabilities Enable Easy DDoS Attacks
All an attacker needs to exploit flaws in the Common Unix Printing System is a few seconds and less than 1 cent in computing costs.
2024. október 2.
Biztonsági szemle
Security related Docker containers, (Wed, Oct 2nd)
Over the last 9 months or so, I've been putting together some docker containers that I find useful in my day-to-day malware analysis and forensicating. I have been putting them up on hub.docker.com and decided, I might as well let others...
2024. október 2.
Biztonsági szemle
North Korean's Stonefly shifts from espionage to ransomware, extortion
While it not has been successful on its first wave of attacks, security pros warn that Stonefly intends to extort U.S. companies via ransomware.
2024. október 2.
Biztonsági szemle
Python-Based Malware Slithers Into Systems via Legit VS Code
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines.
Oldalszámozás
- Előző oldal ‹‹
- 631. oldal
- Következő oldal ››