Security Bulletin
26 Apr 2024
Biztonsági szemle
CISO Corner: Evil SBOMs; Zero-Trust Pioneer Slams Cloud Security; MITRE's Ivanti Issue
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: security license mandates; a move to four-day remediation requirements; lessons on OWASP for LLMs...
26 Apr 2024
Biztonsági szemle
Impact of organizational structure on ransomware outcomes: Where does your org fit in?
Organizational models faced challenges in core security operations like threat detection and remediation, indicating a potential need for additional expertise regardless of structure.
26 Apr 2024
Biztonsági szemle
Kaiser Permanente notifies 13.4M patients of potential data exposure
Patient data may have been transferred via apps to third-party vendors like Google, Microsoft and X.
26 Apr 2024
Biztonsági szemle
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
26 Apr 2024
Biztonsági szemle
Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
Attackers will likely use software bills-of-material (SBOMs) for searching for software potentially vulnerable to specific software flaws.
26 Apr 2024
Biztonsági szemle
AI sparks increasing cyber concerns for execs amid growing adoption
Twenty percent of cybersecurity officers across the UK cited artificial intelligence as their organizations' most significant cybersecurity threat, according to TechRadar.
26 Apr 2024
Biztonsági szemle
Updated CISA exploited vulnerabilties catalog includes Windows print spooler bug
Attacks by Russian threat operation APT28, also known as Fancy Bear, Strontium, and Forest Blizzard, using the GooseEgg malware to exploit the Windows print spooler flaw, tracked as CVE-2022-38028, have prompted the security issue's inclusion to the...
26 Apr 2024
Biztonsági szemle
Minimum Viable Compliance: What You Should Care About and Why
Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.
26 Apr 2024
Biztonsági szemle
More details on rural water system breach sought by legislators
U.S. Department of Homeland Security Secretary Alejandro Mayorkas has been urged by Reps. Ruben Gallego, D-Ariz., and Pat Fallon, R-Texas, to provide more information regarding the January cyberattack against a water treatment plant in Muleshoe...
26 Apr 2024
Biztonsági szemle
Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack
The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.
26 Apr 2024
Biztonsági szemle
Phishing attack compromises LA County Health Services data
Individuals receiving healthcare across Los Angeles had their personal and health data compromised following a successful phishing attack against Los Angeles County Department of Health Services, which is the second largest U.S. public healthcare...
26 Apr 2024
Biztonsági szemle
Android device hijacking facilitated by new Brokewell banking trojan
BleepingComputer reports that Android devices could have their data compromised and be eventually hijacked in attacks with the novel Brokewell banking trojan.
Pagination
- Previous page ‹‹
- Page 145
- Next page ››