Security Bulletin

21 Nov 2024
Biztonsági szemle
Ransomware attacks primarily caused by poor cyber hygiene
Aside from primarily leveraging basic usernames for their accounts, organizations impacted by ransomware intrusions from July to September — including those in the government and healthcare industries — also mostly failed to implement multi-factor...

21 Nov 2024
Biztonsági szemle
Misconfigured Forces Penpals server leaks over 1.1M users' data
Data within the unsecured database included military personnel and their supporters' full names, images, mailing addresses, locations, images, Social Security numbers, and National Insurance numbers, a report by cybersecurity researcher Jeremy Fowler...

21 Nov 2024
Biztonsági szemle
Senate panel OKs several cybersecurity bills
Numerous cybersecurity-related measures have been advanced by the Senate Homeland Security and Governmental Affairs Committee, led by the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2024, which would mandate the adoption of...

21 Nov 2024
Biztonsági szemle
Phobos ransomware operation uncovered by indictment against suspected admin
Included in the Phobos-hit organizations that paid a ransom were a California public school system, a North Carolina children's hospital, a Maryland-based accounting and consulting service provider, and health organizations in Pennsylvania and...

21 Nov 2024
Biztonsági szemle
Most prevalent, menacing software vulnerabilities ranked by MITRE
MITRE has regarded cross-site scripting flaws as the most common and severe software vulnerabilities this year, followed by out-of-bounds write, SQL injection, cross-site request forgery, and path traversal issues.

21 Nov 2024
Biztonsági szemle
Novel NFC-exploiting Ghost Tap attack technique gains traction
Attacks involving Ghost Tap commence with the compromise of payment card data and one-time passwords for virtual wallets, which are then delivered by a relay server to money mules who could withdraw the funds without being easily detected...

21 Nov 2024
Biztonsági szemle
Telcos subjected to Chinese cyberespionage intrusions
Intrusions by Liminal Panda, which had some components resembling those leveraged in LightBasin attacks, involved the utilization of the SIGTRANslator Linux ELF binary, network-scanning CordScan utility, and the PingPong backdoor, according to an...

21 Nov 2024
Biztonsági szemle
Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters
The future of cybersecurity isn't about preventing every breach — it's about learning and growing stronger with each attack.

21 Nov 2024
Biztonsági szemle
How Can PR Protect Companies During a Cyberattack?
When a cybersecurity incident occurs, it's not just IT systems and data that are at risk — a company's reputation is on the line, too.

21 Nov 2024
Biztonsági szemle
Here’s what to know about Google Cloud mandating MFA by end of 2025
Google’s move will spur other providers to encourage MFA – and that’s a positive development for our industry.

21 Nov 2024
Biztonsági szemle
Riasztás Palo Alto, VMware és Fortinet termékek sérülékenységeiről
A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki kritikus kockázati besorolású sérülékenységekről Palo Alto tűzfalak, VMware vCenter szerverszoftverek, valamint a Fortinet VPN klienst érintően, a termékek...

21 Nov 2024
Biztonsági szemle
Ubuntu affected by 10-year-old flaws in needrestart package
The five vulnerabilities could lead to local privilege escalation without user interaction.
Pagination
- Previous page ‹‹
- Page 292
- Next page ››