Biztonsági szemle
2024. Aug. 2.
Biztonsági szemle
Even Linux users should take a look at this Microsoft KB article., (Fri, Aug 2nd)
Secure boot has been a standard feature since at least Windows 8. As the name implies, the feature protects the boot process. The integrity of the boot process is ensured by digitally signing any software ("firmware") used during the boot process. As...
2024. Aug. 2.
Biztonsági szemle
Questions to ask before you shop for a consolidated security platform
There are many good reasons to adopt a consolidated security platform -- but there are also several things to consider before you take that step.
2024. Aug. 2.
Biztonsági szemle
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
2024. Aug. 2.
Biztonsági szemle
Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
2024. Aug. 2.
Biztonsági szemle
China's APT41 Targets Taiwan Research Institute for Cyber Espionage
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.
2024. Aug. 2.
Biztonsági szemle
Twilio Users Kicked Out of Desktop App, Forced to Switch to Mobile
Now that the Authy Desktop app has reached EOL and is no longer accessible, users are hoping their 2FA tokens synced correctly with their mobile devices.
2024. Aug. 2.
Biztonsági szemle
Rhysida auctions Columbus data after city halts ransomware encryption
The ransomware gang claims to have 6.5 TB of data on city employees and emergency services.
2024. Aug. 2.
Biztonsági szemle
Attackers exploit StackExchange to load malicious packages to PyPI
Checkmarx researchers say the infostealer malware exfiltrated sensitive data and drained the crypto wallets of developers.
2024. Aug. 2.
Biztonsági szemle
Is the US Federal Government Increasing Cyber-Risk Through Monoculture?
In a monoculture, cybercriminals need to look for a weakness in only one product, or discover an exploitable vulnerability, to affect a significant portion of services.
2024. Aug. 2.
Biztonsági szemle
Remote SMB Security—Protect Your Business While Traveling
While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses...
2024. Aug. 2.
Biztonsági szemle
Disney, Nike, IBM Signatures Anchor 3M Fake Emails a Day
A simple toggle in Proofpoint's email service allowed for brand impersonation at an industrial scale. It prompts the question: Are secure email gateways (SEGs) secure enough?
2024. Aug. 2.
Biztonsági szemle
Implementing Identity Continuity With the NIST Cybersecurity Framework
Having a robust identity continuity plan is not just beneficial but essential for avoiding financially costly and potentially brand-damaging outages.
Oldalszámozás
- Előző oldal ‹‹
- 685. oldal
- Következő oldal ››