Security Bulletin
![Roku-3-with-Headphones-1024×597-1](/sites/default/files/styles/narrow_1x/public/feeds/9a/roku-3-with-headphones-1024x59_372700.jpg.webp?itok=pc6miqmQ)
12 Mar 2024
Biztonsági szemle
Over 15K Roku accounts breached
Roku had accounts from 15,363 customers compromised following a credential stuffing attack between late December and late February.
![](/sites/default/files/styles/narrow_1x/public/feeds/92/021224_ransomware.jpg.webp?itok=Q3vOUam5)
12 Mar 2024
Biztonsági szemle
LockBit ransomware attack compromises EquiLend data
Information compromised in the attack included employees' personally identifiable information, including their names, birthdates, and Social Security numbers, according to breach notification letters sent by EquiLend.
![Change Healthcare](/sites/default/files/styles/narrow_1x/public/feeds/bb/BrianNeuhausCol.jpg.webp?itok=-aUVDYlS)
12 Mar 2024
Biztonsági szemle
Change Healthcare attack calls for health sector to take on a more proactive security stance
Sure, we can learn from past incidents, by healthcare needs a more proactive approach to security.
![Digital fingerprint scanner, scan biometric identity and access](/sites/default/files/styles/narrow_1x/public/feeds/f1/031124_digital_fingerprint.jpg.webp?itok=rzOX73i2)
12 Mar 2024
Biztonsági szemle
Converged Identity Platforms consolidate features found in other technologies
Converged identity platforms eliminate many of the challenges commonly found with solution suites.
![Zero Trust](/sites/default/files/styles/narrow_1x/public/feeds/31/031124_zero_trust.jpg.webp?itok=alQ8ryGy)
11 Mar 2024
Biztonsági szemle
Converged Identity Platforms map permissions to enable Zero Trust
CIPs provide visibility of all identities (human and machine) regardless of environment.
![IT technician or engineer connects a gigabit network cable into switch in datacenter](/sites/default/files/styles/narrow_1x/public/feeds/62/031124_computer_cables.jpg.webp?itok=2CRegzMn)
11 Mar 2024
Biztonsági szemle
QNAP fixes three bugs on NAS devices, one critical authentication flaw
The critical flaw is an authentication bug could let users compromise the security of the system.
![The Cybersecurity and Infrastructure Security Agency (CISA) emblem is seen at its headquarters in Arlington, Va.](/sites/default/files/styles/narrow_1x/public/feeds/79/1016_cisa.jpg.webp?itok=m3smxJyi)
11 Mar 2024
Biztonsági szemle
CISA breached by hackers exploiting Ivanti bugs
Magnet Goblin, a newly identified cyber gang, is the latest threat group discovered abusing the Ivanti flaws.
![Network security experts analyzing a firewall breach](/sites/default/files/styles/narrow_1x/public/feeds/fb/1130_security_operations.jpg.webp?itok=QISDHvkd)
11 Mar 2024
Biztonsági szemle
Funding round secures $20M for Reach Security
Reach Security has pulled in $20 million from a Series A funding round, which will be used toward the development of tools that would help organizations navigate cybersecurity solutions and strengthen network visibility.
![Gazer backdoor spyware](/sites/default/files/styles/narrow_1x/public/feeds/87/spy_1282515.jpg.webp?itok=Yz7gShV0)
11 Mar 2024
Biztonsági szemle
US sanctions against Predator spyware prompt worry among spyware makers
Newly imposed U.S. sanctions against Tal Jonathan Dillian, founder of the Intellexa Consortium have triggered worries from individuals who were previously part of the government spyware sector.
![School kids](/sites/default/files/styles/narrow_1x/public/feeds/58/kidsatschool_1295135.jpg.webp?itok=47kzKSY4)
11 Mar 2024
Biztonsági szemle
Underage youths' data peddled by data brokers
Ongoing sales of data belonging to underage individuals were disclosed by 24 of 480 data brokers recognized by the California Privacy Protection Agency.
![<p>Jen Easterly speaks during her June 10, 2021, Senate confirmation hearing to head Homeland Security’s Cybersecurity and Infrastructure Security Agency in Washington. (Kevin Dietsch/Getty Images)</p>](/sites/default/files/styles/narrow_1x/public/feeds/28/GettyImages-1322884556.jpg.webp?itok=s-2zc_5K)
11 Mar 2024
Biztonsági szemle
CISA's open source software security initiatives detailed
Open source software security is being planned to be strengthened by the Cybersecurity and Infrastructure Security Agency through the Principles for Package Repository Security.
![Killnet DDoS attacks subside, but ID risk are on uptick](/sites/default/files/styles/narrow_1x/public/feeds/b6/healthcare-city.jpg.webp?itok=jVn1Bfho)
11 Mar 2024
Biztonsági szemle
Post-ransomware restoration progresses at Change Healthcare
Operations of Change Healthcare's electronic prescription services have been completely restored alongside its claims submission and payment transmission functions weeks after the far-reaching ALPHV/BlackCat ransomware attack.
Pagination
- Previous page ‹‹
- Page 201
- Next page ››