Security Bulletin

15 Oct 2024
Biztonsági szemle
What the US can learn from the UK and EU about regulating AI
There are ways to protect the public from the potential dangers of AI without stifling innovation – and the Europeans have already shown us how.

15 Oct 2024
Biztonsági szemle
Even Orgs With SSO Are Vulnerable to Identity-Based Attacks
Use SSO, don't use SSO. Have MFA, don't have MFA. An analysis of a snapshot of organizations using Push Security's platform finds that 99% of accounts susceptible to phishing attacks.

15 Oct 2024
Biztonsági szemle
Southeast Asian Cybercrime Profits Fuel Shadow Economy
With cybercriminal gangs raking in at least $18 billion regionally — and much more globally — law enforcement and policymakers are struggling to keep up as the syndicates innovate and entrench themselves in national economies.

15 Oct 2024
Biztonsági szemle
Serious Adversaries Circle Ivanti CSA Zero-Day Flaws
Suspected nation-state actors are spotted stringing together three different zero-days in the Ivanti Cloud Services Application to gain persistent access to a targeted system.

14 Oct 2024
Biztonsági szemle
Pentagon shares new cybersecurity rules for government contractors
The DOD introduced new cybersecurity requirements for companies that contract with the federal government.

14 Oct 2024
Biztonsági szemle
Pokémon Gaming Company Employee Info Leaked in Hack
The gaming company reports that the server has been rebuilt after the leak, but has not confirmed if its insider video game data was leaked.

14 Oct 2024
Biztonsági szemle
The Lingering 'Beige Desktop' Paradox
Organizations are grappling with the risks of having outdated hardware handling core workloads, mission-critical applications no one knows how to update or maintain, and systems that IT and security teams don't know about.

14 Oct 2024
Biztonsági szemle
Microsoft: Schools Grapple With Thousands of Cyberattacks Weekly
Education, including K-12 schools and universities, has become the third most targeted sector due to the high variety of sensitive data it stores in its databases.

14 Oct 2024
Biztonsági szemle
Vulnerable instances of Log4j still being used nearly 3 years later
Critical vulnerabilities take over 500 days to be fixed.

14 Oct 2024
Biztonsági szemle
Command-jacking used to launch malicious code on open-source platforms
Attackers hijack legitimate commands and run malicious code to launch supply chain attacks.

14 Oct 2024
Biztonsági szemle
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.

14 Oct 2024
Biztonsági szemle
Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day.
Pagination
- Previous page ‹‹
- Page 335
- Next page ››