Biztonsági szemle
2024. március 26.
Biztonsági szemle
Malware, scams promoted by Google AI-powered search algorithms
Malicious websites redirecting to fraudulent giveaways, tech support scams, and spam subscriptions were discovered by search engine optimization expert Lily Ray and pushed by Google's newly launched artificial intelligence-based Search Generative...
2024. március 26.
Biztonsági szemle
Raspberry Pi exploited by novel GEOBOX tool
Stealthier attacks have been facilitated by threat actors through the utilization of several strategically positioned internet-connected GEOBOX devices.
2024. március 26.
Biztonsági szemle
New Tycoon 2FA PhaaS kit examined
Microsoft 365 and Gmail accounts have been increasingly targeted with attacks leveraging the new Tycoon 2FA phishing-as-a-service kit.
2024. március 26.
Biztonsági szemle
Top.gg, others targeted by software supply chain attack
Top.gg GitHub organization, which is commonly leveraged for Discord servers, and other GitHub developers have been compromised in a new software supply chain attack campaign that involved browser cookie exfiltration and malicious PyPi package...
2024. március 26.
Biztonsági szemle
Novel MuddyWater phishing campaign hits Israel
Attacks commenced with the delivery of malicious emails with PDF attachments linking to file-sharing site-hosted documents, which when opened fetches an MSI installer-containing ZIP archive that prompts Atera Agent installation.
2024. március 26.
Biztonsági szemle
ISC Stormcast For Tuesday, March 26th, 2024 https://isc.sans.edu/podcastdetail/8910, (Tue, Mar 26th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2024. március 26.
Biztonsági szemle
GoFetch: Apple chips vulnerable to encryption key stealing attack
Data memory-dependent prefetching can enable side-channel extraction of cryptographic secrets.
2024. március 25.
Biztonsági szemle
Sustainability 101: What is environmental reporting?
Curious about environmental reporting? Learn how it helps increase transparency and trust, and helps promote best practices.
2024. március 25.
Biztonsági szemle
A Solution Engineer’s Journey into Programmability
Solutions Engineer Marcio Costa created a Q&A bot in Webex by integrating it with ChatGPT using OpenAI APIs. Follow along as Marcio explains how he learned the basics of APIs, practiced with Cisco DevNet Learning Labs, and used Webex Connect to...
2024. március 25.
Biztonsági szemle
Hunter-killer malware: How to prevent it from undermining security controls
The Red Report shows the growing sophistication of threat actors to disable a target’s defenses.
2024. március 25.
Biztonsági szemle
Apple Updates for MacOS, iOS/iPadOS and visionOS, (Mon, Mar 25th)
Last week, Apple published updates for iOS and iPadOS. At that time, Apple withheld details about the security content of the update. This is typical if future updates for other operating systems will fix the same vulnerability. Apple's...
2024. március 25.
Biztonsági szemle
StrelaStealer malware hits more than 100 EU and US organizations
Security pros say StrelaStealer uses control flow obfuscation — a technique that lets the threat actor better evade detection and reverse engineering.
Oldalszámozás
- Előző oldal ‹‹
- 982. oldal
- Következő oldal ››