Biztonsági szemle
2025. már. 13.
Biztonsági szemle
Philips Intellispace Cardiovascular (ISCV)
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Philips Equipment: Intellispace Cardiovascular (ISCV) Vulnerabilities: Improper Authentication, Use of Weak Credentials 2. RISK EVALUATION Successful exploitation of...
2025. már. 13.
Biztonsági szemle
CISA Releases Thirteen Industrial Control Systems Advisories
CISA released thirteen Industrial Control Systems (ICS) advisories on March 13, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-072-01 Siemens Teamcenter...
2025. már. 13.
Biztonsági szemle
Sungrow iSolarCloud Android App WiNet Firmware
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.5 ATTENTION: Exploitable remotely Vendor: Sungrow Equipment: iSolarCloud Android App, WiNet Firmware Vulnerabilities: Improper Certificate Validation, Use of a Broken or Risky Cryptographic Algorithm...

2025. már. 13.
Biztonsági szemle
OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack
Researchers from Symantec showed how OpenAI's Operator agent, currently in research preview, can be used to construct a basic phishing attack from start to finish.

2025. már. 13.
Biztonsági szemle
Leading the Charge: Delaware State University’s Digital Evolution
Delaware State University has transformed its digital landscape through a strategic partnership with Cisco, enhancing cybersecurity, educational technology, and student success, positioning itself as a leader in technological innovation.

2025. már. 13.
Biztonsági szemle
Abu Dhabi Guidelines Offer Blueprint for Cybersecurity in Health
Following increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare.

2025. már. 13.
Biztonsági szemle
ISC Stormcast For Thursday, March 13th, 2025 https://isc.sans.edu/podcastdetail/9362, (Thu, Mar 13th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. már. 13.
Biztonsági szemle
File Hashes Analysis with Power BI from Data Stored in DShield SIEM, (Wed, Mar 12th)
I previously used Power BI [ 2] to analyze DShield sensor data and this time I wanted to show how it could be used by selecting certain type of data as a large dataset and export it for analysis. This time, I ran a query in Elastic Discover and...

2025. már. 12.
Biztonsági szemle
Healthcare cybersecurity set for AI boom in 2025
According to a CRA survey, 50% of healthcare organizations are already using AI tools in their cybersecurity practices.

2025. már. 12.
Biztonsági szemle
Android spyware ‘KoSpy’ spread by suspected North Korean APT
Malicious apps previously in the Google Play Store enabled theft of messages, files and more.

2025. már. 12.
Biztonsági szemle
XCSSET macOS malware variant targets Xcode projects of app developers
XCSSET variant features enhanced stealth features that can lead to the exfiltration of sensitive financial information.
2025. már. 12.
Biztonsági szemle
China-Backed Hackers Backdoor US Carrier-Grade Juniper MX Routers
Mandiant researchers found the routers of several unnamed organizations (likely telcos and ISPs) were hacked by UNC3886, and contained a custom backdoor called "TinyShell."
Oldalszámozás
- Előző oldal ‹‹
- 84. oldal
- Következő oldal ››