Security Bulletin
![A computer screen with Javascript is seen](/sites/default/files/styles/narrow_1x/public/feeds/35/011824_javascript.jpg.webp?itok=CC9kWIrE)
22 Apr 2024
Biztonsági szemle
More sophisticated, stealthy RedLine Stealer variant emerges
Information-stealing trojan RedLine Stealer has gained a more advanced variant leveraging the Lua bytecode and spoofing game cheats to facilitate increased stealth, The Hacker News reports.
![Malware attack virus alert. Person use laptop with virtual warning sign with ransomware word. warning notification, Cyber threats.](/sites/default/files/styles/narrow_1x/public/feeds/66/012324_ransomware.jpg.webp?itok=oHUcda34)
22 Apr 2024
Biztonsági szemle
Massive data leak conducted by HelloKitty ransomware amid rebrand
Ransomware operation HelloKitty has coincided its rebranding to HelloGookie with the publication of internal Cisco network data exfiltrated from a 2022 attack, exfiltrated source code for several CD Projekt Red games from a 2021 attack, and four...
![Abstract Red Background with Binary Code Numbers. Data Breach, Malware, Cyber Attack, Hacking](/sites/default/files/styles/narrow_1x/public/feeds/c8/040423_malware.jpg.webp?itok=--SDNIB_)
22 Apr 2024
Biztonsági szemle
New tool used in China-linked attacks against Asia-Pacific
Intrusions with the Waterbear backdoor and its updated variant dubbed "Deuterbear" have been deployed by China-linked threat operation BlackTech — also known as Earth Hundun, Manga Taurus, Circuit Panda, Temp.Overboard, Palmerwom, Red Djinn, and...
![Cloud technology and Data storage concept, Concept of Exchange information and data with internet cloud technology. FTP(File Transfer Protocol) files receiver.](/sites/default/files/styles/narrow_1x/public/feeds/c8/041024_file_transfer.jpg.webp?itok=Nps6mYF3)
22 Apr 2024
Biztonsági szemle
Intrusions exploiting critical CrushFTP zero-day underway
Vulnerable CrushFTP file transfer server software instances impacted by a critical virtual file system escape zero-day have been subjected to ongoing targeted attacks that could enable the download of system files, Security Affairs reports.
![<p>(Credit: Rafael Henrique – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/8e/AdobeStock_493255938_Editorial_Use_Only.jpg.webp?itok=9xr8sCnY)
22 Apr 2024
Biztonsági szemle
Active Palo Alto vulnerability exploitation puts over 22K firewalls at risk
BleepingComputer reports that ongoing attacks exploiting the critical Palo Alto Networks PAN-OS command injection flaw, tracked as CVE-2024-3400, could still compromise nearly 22,500 Palo Alto GlobalProtect firewall instances around the world despite...
![UnitedHealthcare's Change Healthcare](/sites/default/files/styles/narrow_1x/public/feeds/25/041924_united_healthcare.jpg.webp?itok=tToC5xJW)
22 Apr 2024
Biztonsági szemle
Will the Change Healthcare case finally make providers do a business impact analysis?
The industry has talked about BIAs for years – and most providers still lean on cyber insurance in the wake of attack. That has to change.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
22 Apr 2024
Biztonsági szemle
Kezdjünk új karriert a kiberbiztonság területén!– SANS OUCH! – 2024. április
A SANS és a Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet közös kiadványának 2024. áprilisi számában azzal foglalkozunk, hogy miért és hogyan kezdjünk karriert építeni a kiberbiztonság területén.
![](/sites/default/files/styles/narrow_1x/public/feeds/69/burnout_Panther_Media_GmbH_Alamy_Stock_Photo.jpg.webp?itok=gmluyMfI)
19 Apr 2024
Biztonsági szemle
CISO Corner: Breaking Staff Burnout, GPT-4 Exploits, Rebalancing NIST
SecOps highlights this week include the executive role in "cyber readiness;" Cisco's Hypershield promise; and Middle East cyber ops heat up.
![](/sites/default/files/styles/narrow_1x/public/feeds/d3/325351_DR23_Graphics_General_Large_Text_v1.png.webp?itok=t_2x_glb)
19 Apr 2024
Biztonsági szemle
Miggo Launches Application Detection and Response (ADR) Solution
![database_AdobeStock_626499876](/sites/default/files/styles/narrow_1x/public/feeds/46/AdobeStock_626499876.jpg.webp?itok=kOqQ0fk5)
19 Apr 2024
Biztonsági szemle
5.3M World-Check records may be leaked; how to check your records
Hackers claim to have obtained the records by breaching a third party with access to the database.
![](/sites/default/files/styles/narrow_1x/public/feeds/df/chinathreat_KaimDH_shutterstock.jpg.webp?itok=xB-gvIyU)
19 Apr 2024
Biztonsági szemle
FBI Director Wray Issues Dire Warning on China's Cybersecurity Threat
Chinese actors are ready and poised to do "devastating" damage to key US infrastructure services if needed, he said.
![<p>Credit: Getty Images</p>](/sites/default/files/styles/narrow_1x/public/feeds/09/map-cyberattacks-globe-GettyImages-1199826393.jpg.webp?itok=UMZ_2G1B)
19 Apr 2024
Biztonsági szemle
Active adversary report: Ransomware hit a ceiling, but security teams at risk for more pain
Despite a pause in the rise of ransomware, organizations are failing to take the steps necessary to adequately defend themselves against the increase in attacks to come.
Pagination
- Previous page ‹‹
- Page 157
- Next page ››