Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/01/Pills_kravaivan11_Pixabay.jpg.webp?itok=wIkHMfv6)
23 Feb 2024
Biztonsági szemle
Pharmacy Delays Across US Blamed on Nation-State Hackers
Healthcare tech provider Change Healthcare says a suspected nation-state threat actor breached its systems, causing pharmacy transaction delays nationwide.
![](/sites/default/files/styles/narrow_1x/public/feeds/30/lockbit_Steve_Heap_shutterstock.jpg.webp?itok=SR2g3hi8)
23 Feb 2024
Biztonsági szemle
Hubris May Have Contributed to Downfall of Ransomware Kingpin LockBit
The most prolific ransomware group in recent years was on the decline at the time of its takedown, security researchers say.
![](/sites/default/files/styles/narrow_1x/public/feeds/94/NSA_Carsten_Reisinger_ALAMY.jpg.webp?itok=irGTy9QL)
22 Feb 2024
Biztonsági szemle
NSA Cybersecurity Director Rob Joyce to Retire
His retirement will go into effect on March 31, concluding 34 years of service to the National Security Agency.
![](/sites/default/files/styles/narrow_1x/public/feeds/1a/china_Rokas_Tenys_shuttertock.jpg.webp?itok=tWCPWAxA)
22 Feb 2024
Biztonsági szemle
iSoon's Secret APT Status Exposes China's Foreign Hacking Machinations
Chinese government agencies are paying an APT, masked as a legitimate company, to spy on foreign and domestic targets of political interest.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
22 Feb 2024
Biztonsági szemle
High-volume malware campaigns involve Google Cloud Run exploitation
BleepingComputer reports that several countries across Latin America have been subjected to high-volume attacks deploying the Astaroth, Ousaban, and Mekotio banking trojans.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
22 Feb 2024
Biztonsági szemle
Sophisticated PlugX backdoor variant leveraged in Mustang Panda attacks
Numerous countries across Asia, including Taiwan, Vietnam, India, Japan, and China, have been targeted by Chinese state-backed advanced persistent threat operation Mustang Panda.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
22 Feb 2024
Biztonsági szemle
Cyberattack disrupts Change Healthcare
TechCrunch reports that major U.S. healthcare revenue and payment cycle management provider Change Healthcare had its systems targeted by a cyberattack on Feb. 20, which resulted in the loss of access across most of the prescription processor's login...
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
22 Feb 2024
Biztonsági szemle
Accelerated cyberattack velocity, mounting cloud attacks reported
Cyberattacks have become quicker and intrusions against cloud environments have become more prevalent during the past year, according to SiliconAngle.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
22 Feb 2024
Biztonsági szemle
Novel Wi-Fi flaw could trigger widespread hacks, experts
Android, ChromeOS, and Linux devices are being impacted by a pair of authentication bypass vulnerabilities within open-source Wi-Fi management software wpa_supplicant.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
22 Feb 2024
Biztonsági szemle
Microsoft expands security logging to all federal agencies
Microsoft has announced that it will be expanding security logs across all federal agencies this month.
![](/sites/default/files/styles/narrow_1x/public/feeds/05/photon-photo-cyberinsurance-shutterstock.jpg.webp?itok=LxL2qTKD)
22 Feb 2024
Biztonsági szemle
Insurers Use Claims Data to Recommend Cybersecurity Technologies
Policy holders using certain technologies — such as managed detection and response (MDR) services, Google Workspace, and email security gateways — gain premium discounts from cyber insurers.
![snake_AdobeStock_528965268](/sites/default/files/styles/narrow_1x/public/feeds/82/AdobeStock_528965268.jpg.webp?itok=49QlqYMA)
22 Feb 2024
Biztonsági szemle
Attackers target Confluence flaws with SSH-Snake pentesting tool
The fileless, self-modifying, worm-like network traversal tool automatically searches for SSH keys.
Pagination
- Previous page ‹‹
- Page 227
- Next page ››