Security Bulletin
5 Feb 2025
Biztonsági szemle
Third-party breach impacts Grubhub customer data
Such a third-party breach not only led to the exposure of individuals' names, phone numbers, and email addresses, but also the exfiltration of some customers' partial credit card details and legacy systems' hashed credentials, said Grubhub in a...
5 Feb 2025
Biztonsági szemle
Macs targeted by almost two dozen newly emergent payloads last year
Aside from the Banshee, CloudChat, PyStealer, and Poseidon payloads that focus on cryptocurrency wallet theft, Macs have also been subjected to attacks with the NotLockBit ransomware and the North Korea-linked SpectralBlur implant, according to a...
5 Feb 2025
Biztonsági szemle
Extensive software supply chain compromise possible with deserted AWS S3 buckets
Nearly 150 S3 buckets previously leveraged by cybersecurity firms, governments, Fortune 500 companies, and open source projects could be re-registered with the same AWS account name to facilitate executable and/or code injections in the deployment...
5 Feb 2025
Biztonsági szemle
More sophisticated ValleyRAT malware version emerges
This campaign primarily targets finance, accounting, and sales professionals, aiming to steal sensitive data.
5 Feb 2025
Biztonsági szemle
Novel SSH backdoor leveraged in Chinese cyberespionage attacks
Initial network appliance compromise and operation under root privileges will be verified before the deployment of the "libssdh.so" SSH library for data exfiltration and command-and-control communications and the "mainpasteheader" and...
5 Feb 2025
Biztonsági szemle
7 cloud security startups not named Wiz
Wiz has dominated the cloud startup market for several years, but there are lesser-known startups that offer some very targeted cloud security products.
5 Feb 2025
Biztonsági szemle
Enforcement of the Digital Operational Resilience Act (DORA) - Madelein van der Hout - BSW #381
5 Feb 2025
Biztonsági szemle
Nigeria Touts Cyber Success, Even as Cybercrime Rises in Africa
Organizations continue to be at high risk from cybercrime in Africa, despite law enforcement takedowns of cybercriminal syndicates in Nigeria and other African nations.
5 Feb 2025
Biztonsági szemle
Microsoft fixes CVSS 9.9 vulnerability in Azure AI Face service
The flaw enabled authentication bypass by spoofing, with a proof-of-concept exploit available.
5 Feb 2025
Biztonsági szemle
How Are Modern Fraud Groups Using GenAI and Deepfakes?
Fraud groups are using cutting-edge technology to scale their operations to create fake identities and execute fraud campaigns.
4 Feb 2025
Biztonsági szemle
Backline Tackles Enterprise Security Backlogs With AI
The security startup's autonomous security remediation platform uses off-the-shelf large language models (LLMs) to analyze security alerts and apply the fixes.
4 Feb 2025
Biztonsági szemle
CISA, international agencies offers guidance on edge threats
CISA posted a set of guidelines aimed at helping companies better secure the commonly used devices.
Pagination
- Previous page ‹‹
- Page 237
- Next page ››