Security Bulletin
![A detailed digital illustration of a skull and virus icons on a red code screen, symbolizing cyber threats, hacking, and digital security breaches.](/sites/default/files/styles/narrow_1x/public/feeds/f2/070824_ransomware.jpg.webp?itok=AW8lsrJW)
8 Jul 2024
Biztonsági szemle
Victims of cyber extortion and ransomware increase in 2024
Ransomware victims can be hit multiple times by affiliate gangs in "re-victimization."
![Abstract Malware Ransomware virus encrypted files with key on binary bit background.](/sites/default/files/styles/narrow_1x/public/feeds/f8/1020_ransomware.jpg.webp?itok=RIRIVhLL)
8 Jul 2024
Biztonsági szemle
Alabama education department still impacted by thwarted ransomware intrusion
Operations and some data at the Alabama State Department of Education have been compromised following a thwarted ransomware attack last month, according to The Record, a news site by cybersecurity firm Recorded Future.
![](/sites/default/files/styles/narrow_1x/public/feeds/75/ransomware-data.jpg.webp?itok=zYXT29Gq)
8 Jul 2024
Biztonsági szemle
Florida health department data exposed by RansomHub
Ransomware gang RansomHub has exposed 100 GB of data allegedly stolen from the Florida Department of Health following the agency's failure to provide the demanded ransom on Friday, StateScoop reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/cf/061424_data_breach.jpg.webp?itok=QDyTdZwq)
8 Jul 2024
Biztonsági szemle
Data breach claims rejected by Shopify
Major e-commerce platform Shopify announced that none of its systems had been breached following the claims of the 888 threat operation alleging the theft of the e-commerce giant's data, BleepingComputer reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/2a/missioncontrol%281800%29-Science_History_Images-alamy.jpg.webp?itok=Tl12QZul)
8 Jul 2024
Biztonsági szemle
5 Ways to Run Security as a Meritocracy
Actions speak louder than words. Here are five tips for encouraging a security culture based on achievements.
![](/sites/default/files/styles/narrow_1x/public/feeds/7f/Cybersecurity%281800%29_NicoElNino_Alamy.jpg.webp?itok=BwD3wWMp)
8 Jul 2024
Biztonsági szemle
Deconstructing Security Assumptions to Ensure Future Resilience
By breaking down fundamental assumptions, we can proactively plan for, and begin to achieve, future resilience.
![2d illustration ransomware computer virus](/sites/default/files/styles/narrow_1x/public/feeds/ca/1120_ransomware.jpg.webp?itok=Gsqa9wXC)
8 Jul 2024
Biztonsági szemle
Ticketmaster downplays alleged ShinyHunters hack of Taylor Swift tix
Ticketmaster has dismissed the leak of Sp1d3rHunters, previously known as Sp1d3r, of barcode data for 166,000 tickets for upcoming Taylor Swift Eras Tour concerts at Miami, New Orleans, and Indianapolis stolen by ShinyHunters, which purportedly...
![Password protection concept](/sites/default/files/styles/narrow_1x/public/feeds/ab/030724_username.jpg.webp?itok=su5fUkaN)
8 Jul 2024
Biztonsági szemle
Largest password database leak exposes nearly 10M credentials
Cybernews reports that more than 9.948 million unique plaintext passwords from around the world have been exposed by the threat actor dubbed "ObamaCare" as part of the "rockyou2024.txt" file, which is now hailed as the largest password compilation.
![](/sites/default/files/styles/narrow_1x/public/feeds/87/061224_malware.jpg.webp?itok=8wy12WIo)
8 Jul 2024
Biztonsági szemle
Updated GootLoader malware variants emerge
Attacks with the GootLoader malware used to distribute IcedID, REvil, Gootkit, and other payloads have intensified with the appearance of new variants of the loader, which has been associated with the Hive0127 threat operation, also known as UNC2565...
![Closeup of a mobile phone screen with logo lettering of linux on computer keyboard](/sites/default/files/styles/narrow_1x/public/feeds/51/020724_linux.jpg.webp?itok=wBJp8xoJ)
8 Jul 2024
Biztonsági szemle
Attacks with new Mallox ransomware version aimed at Linux
Hackread reports that Linux systems are having their data encrypted with a new variant of the Mallox ransomware, also known as TargetCompany, Mawahelper, and Fargo.
![Managing secrets in the cloud](/sites/default/files/styles/narrow_1x/public/feeds/1c/060524_cloud_security.jpg.webp?itok=S4YJEutW)
8 Jul 2024
Biztonsági szemle
Nine best practices for secrets management in the cloud
Here’s a blueprint for managing company secrets in cloud environments.
![Price](/sites/default/files/styles/narrow_1x/public/feeds/4c/Price-1.jpg.webp?itok=HCL1Fd3z)
8 Jul 2024
Biztonsági szemle
Kymberlee Price: How (and why) I went from CISO to cybersecurity founder
Kymberlee Price reflects on the key events in her career that culminated in the founding of Zatik.
Pagination
- Previous page ‹‹
- Page 34
- Next page ››