Security Bulletin

23 Jan 2025
Biztonsági szemle
CISA: Ivanti Vulns Chained Together in Cyberattack Onslaught
The threat actors are abusing the vulnerabilities to gain initial access, obtain credentials, and install malicious scripts on user devices.

23 Jan 2025
Biztonsági szemle
Think like an attacker: Increase attack surface visibility with integrated exposure management
An integrated exposure management solution allows cyber defenders to go on the offensive.

23 Jan 2025
Biztonsági szemle
Black 'Magic' Targets Enterprise Juniper Routers With Backdoor
Such routers typically lack endpoint detection and response protection, are in front of a firewall, and don't run monitoring software like Sysmon, making the attacks harder to detect.

23 Jan 2025
Biztonsági szemle
The Security Risk of Rampant Shadow AI
While employees want to take advantage of the increased efficiency of GenAI and LLMs, CISOs and IT teams must be diligent and stay on top of the most up-to-date security regulations.

23 Jan 2025
Biztonsági szemle
Improved endpoint security aimed by Citrix with Unicon purchase
Integration of Unicon's Scout enterprise platform in the fold of Citrix would enable the latter's customers to facilitate extensive endpoint management and x86 device platform assimilation ensuring seamless end-to-end corporate app access.

23 Jan 2025
Biztonsági szemle
Data recovery after fulfilling ransomware attack demands mostly unlikely
Only 7% of ransomware-hit organizations around the world were able to recover all their stolen data after paying the ransoms sought by their attackers.

23 Jan 2025
Biztonsági szemle
Increased cybersecurity cooperation forged by Russia, Iran
Russia and Iran have agreed to advance digital space regulations for international tech firms and share know-how on managing the internet, which was declared by human rights nonprofit Freedom House to be "not free" in both countries amid intense...

23 Jan 2025
Biztonsági szemle
User location data exposure threatened by Cloudflare CDN vulnerability
With Cloudflare conducting media resource caching at the data center closest in proximity to its users, security researcher Daniel discovered that an information-disclosure intrusion could be conducted through the delivery of a unique image hosted on...

23 Jan 2025
Biztonsági szemle
Widespread AIRASHI botnet detailed in new report
Aside from the zero-day, threat actors behind AIRASHI also leveraged more than a dozen other security flaws impacting AVTECH IP cameras, Shenzhen TVT appliances, and other devices dating as far back as 2013, a report from QiAnXin XLab researchers...

23 Jan 2025
Biztonsági szemle
Ivanti CSA exploit chains examined in joint CISA, FBI advisory
Attacks with the chained vulnerabilities have been thwarted by three organizations, with the first preventing compromise following sysadmin identification of suspicious user accounts and the second averting the breach after an endpoint protection...

23 Jan 2025
Biztonsági szemle
Malware deployed via new ClickFix attack variant using Silk Road founder as lure
Attackers who made fraudulent but verified Ross Ulbricht accounts on X, formerly Twitter, sought to lure users into joining Telegram channels purporting to be Ulbricht portals, which provided a walk through on the bogus Safeguard identity...

23 Jan 2025
Biztonsági szemle
New Chinese cyberespionage campaign targeted South Korean VPN service
Execution of a trojanized installer triggers deployment of a loader with another DLL eventually resulting in the running of SlowStepper, which supports commands enabling extensive system info theft, file deletion, Python module execution, and self...
Pagination
- Previous page ‹‹
- Page 223
- Next page ››