Security Bulletin

6 Feb 2025
Biztonsági szemle
UN civil aviation agency breach toll confirmed, Arab aviation org compromised
Information exposed by the incident included names, birthdates, email addresses, and employment history, said ICAO in an updated statement that emphasized the delivery of breach notices to impacted individuals.

6 Feb 2025
Biztonsági szemle
New AsyncRAT campaign uncovered
Attacks commenced with the delivery of phishing emails with a Dropbox link that downloads a ZIP archive containing an internet shortcut file with a TryCloudflare URL that fetches an LNK file for further compromise, a report from Forcepoint X-Labs...

6 Feb 2025
Biztonsági szemle
New Lazarus Group campaign targets cryptocurrency wallets
After luring targets into providing their curriculum vitae or GitHub link for fake cryptocurrency, finance, or travel job offers, attackers proceed to share a malicious repository with the project's "minimum viable product," which executes nefarious...

6 Feb 2025
Biztonsági szemle
The Cyber Savanna: A Rigged Race You Can't Win, but Must Run Anyway
When it comes to protecting your company from cyberattacks, you don't have to be the fastest gazelle — you just can't afford to be the slowest.

6 Feb 2025
Biztonsági szemle
Basket of Bank Trojans Defraud Citizens of East India
Cheap banking scams are often easier to pull off in a country with older devices, fewer regulations, and experienced fraudsters.

5 Feb 2025
Biztonsági szemle
Ransomware payments drop 35% in 2024, first decrease since 2022
The first half of 2024 recorded an increase in ransomware payouts.

5 Feb 2025
Biztonsági szemle
C-Suite Cybersecurity Responsibilities, Humble Leaders, and Effective Communication - BSW #381

5 Feb 2025
Biztonsági szemle
Veeam Updater receives update for critical RCE flaw
The vulnerability affects Veeam Backup for Salesforce, AWS, Microsoft Azure, Google Cloud and more.

5 Feb 2025
Biztonsági szemle
Infostealers targeting macOS jumped by 101% in second half of 2024
While infostealers are often seen as less dangerous compared with trojans, they can exfiltrate sensitive data, leading to data breaches.

5 Feb 2025
Biztonsági szemle
Abandoned AWS Cloud Storage: A Major Cyberattack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.

5 Feb 2025
Biztonsági szemle
Build a vulnerability management program with internet exposure in mind
Teams need to adapt their vulnerability management programs to the reality that most of their business today runs on the internet.

5 Feb 2025
Biztonsági szemle
Musk-led DOGE raises cybersecurity alarms
Aside from obtaining access to the Treasury Department's payment system for managing federal system, DOGE was also alleged by Office of Personnel Management employees of having installed an improperly vetted private server that could potentially...
Pagination
- Previous page ‹‹
- Page 205
- Next page ››