Security Bulletin

24 Jan 2025
Biztonsági szemle
Strengthening Our National Security in the AI Era
For the first time in a long while, the federal government and the software sector alike finally have the tools and resources needed to do security well — consistently and cost-effectively.

24 Jan 2025
Biztonsági szemle
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
Such lagging vulnerability remediation for ProxyLogon significantly contrasts patching activities for a pair of Ivanti flaws also leveraged in Salt Typhoon attacks, tracked as CVE-2023-46805 and CVE-2024-21887, which have been addressed in over 92%...

24 Jan 2025
Biztonsági szemle
Ransomware attacks peaked in December
Cl0p, Akira, and RansomHub were the next most active ransomware operations, according to a report from NCC Group.

24 Jan 2025
Biztonsági szemle
INC Ransom takes responsibility for Stark Aerospace compromise
INC Ransom alleged that it was not only able to exfiltrate Stark's supply chain details, building plans, instructor passports, and cybersecurity tool configurations but also reconnaissance satellite and production program information, as well as...

24 Jan 2025
Biztonsági szemle
HellCat, Morpheus RaaS operations leverage similar payloads
Aside from leveraging Windows Cryptographic Application Programming Interface for encrypting data aside from critical system files, both HellCat and Morpheus had ransom notes ordering victims to access their respective .onion portals using the...

24 Jan 2025
Biztonsági szemle
More robust BC malware with QBot ties emerges
Such BC backdoor, which runs as an autonomous program, features not only old QBot samples but also IcedID's KeyHole BC and DarkVNC and was discovered within the ZLoader-distributing infrastructure, a report from Walmart's Cyber Intelligence team...

24 Jan 2025
Biztonsági szemle
Enterprise Juniper routers subjected to malware campaign
Installation of the malware in targeted routers facilitates the deployment of a cd00r variant scanning for five network signals, which when received triggers reverse shell creation on the local file system, enabling device takeover, data exfiltration...

24 Jan 2025
Biztonsági szemle
War Game Pits China Against Taiwan in All-Out Cyberwar
At Black Hat and DEF CON, cybersecurity experts were asked to game out how Taiwan could protect its communications and power infrastructure in case of invasion by China.

24 Jan 2025
Biztonsági szemle
New York fines PayPal $2 million for shoddy security practices
Settlement stems from 2022 data breach that saw some customer Social Security numbers exposed to threat actors.

24 Jan 2025
Biztonsági szemle
GhostGPT offers AI coding, phishing assistance for cybercriminals
The “uncensored” GenAI tool was advertised on cybercrime forums with a focus on BEC scams.

23 Jan 2025
Biztonsági szemle
Tesla Gear Gets Hacked Multiple Times in Pwn2Own Contests
The first team to successfully hack the electric vehicle maker's charger won $50,000 for their ingenuity.

23 Jan 2025
Biztonsági szemle
CISA Calls For Action to Close the Software Understanding Gap
Pagination
- Previous page ‹‹
- Page 221
- Next page ››