Security Bulletin
3 May 2024
Biztonsági szemle
New AI Security Startup Apex Secures AI Models, Apps
The AI security startup’s platform will allow organizations to define appropriate AI usage and enforce security policies.
3 May 2024
Biztonsági szemle
Note to investors and security pros: drive innovation by going on the offensive
A longtime cybersecurity venture capitalist explains why some of his best investments are in people with military backgrounds who have an offensive mindset.
3 May 2024
Biztonsági szemle
‘Junk gun’ ransomware: Peashooters can still pack a punch
A Sophos X-Ops investigation finds that a wave of crude, cheap ransomware could spell trouble for small businesses and individuals – but also provide insights into threat actor career development and the wider threat landscape
3 May 2024
Biztonsági szemle
Mimic Launches With New Ransomware Defense Platform
The new startup’s SaaS platform claims to help organizations detect ransomware attacks faster than “traditional” methods and to recover within 24 hours.
2 May 2024
Biztonsági szemle
Billions of Android Devices Open to 'Dirty Stream' Attack
Microsoft has uncovered a common vulnerability pattern in several apps allowing code execution; at least four of the apps have more than 500 million installations each; and one, Xiaomi's File Manager, has at least 1 billion installations.
2 May 2024
Biztonsági szemle
Critical GitLab account takeover flaw added to CISA’s KEV Catalog
More than 2,100 servers may still be vulnerable to GitLab password reset exploits.
2 May 2024
Biztonsági szemle
DPRK's Kimsuky APT Abuses Weak DMARC Policies, Feds Warn
Organizations can go a long way toward preventing spoofing attacks by changing one basic parameter in their DNS settings.
2 May 2024
Biztonsági szemle
Software Security: Too Little Vendor Accountability, Experts Say
Actual legislation is a long shot and a decade away, but policy experts are looking to jump-start the conversation around greater legal liability for insecure software products.
2 May 2024
Biztonsági szemle
Hacker Sentenced After Years of Extorting Psychotherapy Patients
Two years after a warrant went out for his arrest, Aleksanteri Kivimäki finally has been found guilty of thousands of counts of aggravated attempted blackmail, among other charges.
2 May 2024
Biztonsági szemle
Understanding Scattered Spider, and how they perform cloud-centric identity attacks
Scattered Spider has a history of both traditional and hybrid attacks on cloud enterprise environments.
2 May 2024
Biztonsági szemle
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
2 May 2024
Biztonsági szemle
Continuous threat exposure management (CTEM): What it is and how to achieve it
How continuous threat exposure management (CTEM) discovers, prioritizes, and validates potential risks and aligns remediation with business goals and compliance frameworks.
Pagination
- Previous page ‹‹
- Page 132
- Next page ››