Security Bulletin

13 Jan 2025
Biztonsági szemle
Pastor indicted for Christian-themed cryptocurrency pyramid scam
Francier Obando Pinillo faces 26 counts of fraud for running a scam on his Pasco, Washington, congregation.

13 Jan 2025
Biztonsági szemle
Microsoft Cracks Down on Malicious Copilot AI Use
According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.

13 Jan 2025
Biztonsági szemle
Critical 10.0 Aviatrix Controller flaw exploited in the wild
Aviatrix Controllers are prime targets because they have high-level privileges in cloud environments.

13 Jan 2025
Biztonsági szemle
Cloud Attackers Exploit Max-Critical Aviatrix RCE Flaw
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.

13 Jan 2025
Biztonsági szemle
Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results
Threat actors are targeting people searching for pirated or cracked software with fake downloaders that include infostealing malware such as Lumma and Vidar.

13 Jan 2025
Biztonsági szemle
Telefonica Breach Exposes Jira Tickets, Customer Data
The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.

13 Jan 2025
Biztonsági szemle
Privacy Under Siege: Navigating Data Theft and the BadBox Threat - Gavin Reid - CSP #208

13 Jan 2025
Biztonsági szemle
The Shifting Landscape of Open Source Security
By focusing on vigilant security practices, responsible AI deployment, and alignment with global regulatory standards, the OSS community can make 2025 a transformative year for security.

13 Jan 2025
Biztonsági szemle
Redefining third-party governance and identity for the cloud-first era
Organizations are struggling to enforce security policies outside of traditional office environments, particularly concerning identity and access management, which is further complicated by the use of unsecured home networks and personal devices.

13 Jan 2025
Biztonsági szemle
The hybrid workforce crisis: How it has weakened enterprise security, and what to do about it
More robust identity and access management practices are crucial, especially as remote work environments often lack the security measures found in corporate settings.

13 Jan 2025
Biztonsági szemle
Data breach compromises STIIIZY customers' data
Infiltration of the vendor's systems between October and November exposed not only individuals' names, ages, and addresses, but also photographs, medical cannabis cards, driver's license numbers, and passport numbers, said STIIIZY in a breach notice...

13 Jan 2025
Biztonsági szemle
CISA's Cyber Hygiene enrollment in the upswing
The communications industry logged the highest increase in CyHy enrollment between 2022 and 2024, followed by the emergency services, critical manufacturing, and water and wastewater sectors, the CISA report revealed.
Pagination
- Previous page ‹‹
- Page 235
- Next page ››