Security Bulletin

11 Dec 2024
Biztonsági szemle
Symmetrical Cryptography Pioneer Targets the Post-Quantum Era
Researchers at Cavero have created a correlating numbers mechanism, adding a layer of privacy that even threat actors can't gain enough information to breach.

11 Dec 2024
Biztonsági szemle
Chinese hacker compromised 81K devices via zero-day in Sophos software
The U.S. Department of Justice offers $10 million for information leading to arrest of hacker.

11 Dec 2024
Biztonsági szemle
Researchers Crack Microsoft Azure MFA in an Hour
A critical flaw in the company's rate limit for failed sign-in attempts allowed unauthorized access to a user account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more.

11 Dec 2024
Biztonsági szemle
Ashley Jess: Cybersecurity trailblazer (video)
Honored by SC Media, Ashley Jess shares her journey from FBI analyst to Intel 471 leader, tackling cyber threats and inspiring women in IT security.

11 Dec 2024
Biztonsági szemle
VSCode Remote Tunnels exploited in suspected Chinese cyberespionage campaign
Threat actors behind the intrusions initially compromised internet-exposed apps and database servers with SQL injection before proceeding with PHPsert webshell distribution, reconnaissance, credential compromise, lateral movement, and custom Mimikatz...

11 Dec 2024
Biztonsági szemle
Cybersecurity Lessons From 3 Public Breaches
High-profile security incidents provide examples of how common vulnerabilities can be exploited. If you pay attention, you can learn from others' mistakes.

11 Dec 2024
Biztonsági szemle
US moves against Chinese cybersecurity firm over sweeping Ragnarok ransomware attack
Chinese cybersecurity firm Sichuan Silence has been sanctioned by the U.S. Treasury Department for its role in the widespread exploitation of the Sophos XG firewall zero-day SQL injection flaw, tracked as CVE-2020-12271, to compromise critical...

11 Dec 2024
Biztonsági szemle
Tips for Preventing Breaches in 2025
Hackers are constantly evolving, and so too should our security protocols.

11 Dec 2024
Biztonsági szemle
New ICIT report urges better resilience to threats of a digitally consolidated world
ICIT says the key to resilience is in the four Rs: resourcing, recovery, rehearsals, and response -- all essential to mitigate the risks posed by digital consolidation and ensure the security of critical infrastructure.

11 Dec 2024
Biztonsági szemle
China using 'EagleMsgSpy' malware to tap Android devices
China appears to be merging its government and malware operations to create a new surveillance platform for Android devices.

11 Dec 2024
Biztonsági szemle
GRC is a business enabler – and now you can prove it
Tying GRC activities to real-world financial outcomes allows risk professionals to bridge the communications gap with business leaders.

11 Dec 2024
Biztonsági szemle
Governments, Telcos Ward Off China's Hacking Typhoons
Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving the uptake of encrypted communications.
Pagination
- Previous page ‹‹
- Page 270
- Next page ››