Security Bulletin

5 Sep 2024
Biztonsági szemle
The Imposter Syndrome: The growing threat of fake apps
These copycats are created to appear as if they are legitimate, but instead powerfully malicious punch.

5 Sep 2024
Biztonsági szemle
The Role of Trust Anchors in Modern IT Security
To fully realize the benefits trust anchors provide, organizations need to implement processes and technologies that maintain the privacy and security of trust anchors and the personal data they contain.

5 Sep 2024
Biztonsági szemle
Novel CLFS vulnerability mitigation touted by Microsoft
Appending logfiles with Hash-based Message Authentication Codes, which are generated through the hashing of input data and a secret cryptographic key, would help CLFS determine logfiles subjected to modifications not made by the CLFS driver, noted...

5 Sep 2024
Biztonsági szemle
Ransomware attack compromises Microchip Technology employee data
Information compromised due to the intrusion included employees' contact details and certain encrypted and hashed credentials but no evidence indicated the theft of any customer or supplier data, said Microchip in a new filing with the Securities and...

5 Sep 2024
Biztonsági szemle
Widespread PyPI package takeovers likely with new supply chain attack technique
Attacks enable PyPI software takeovers by re-registering packages upon their removal from the index, an analysis from JFrog showed.

5 Sep 2024
Biztonsági szemle
Cyberattack confirmed by Planned Parenthood of Montana amid RansomHub claims
Immediate incident response protocol adoption and network section takedowns were conducted following the discovery of the intrusion on Aug. 28, according to Planned Parenthood of Montana President and CEO Martha Fuller.

5 Sep 2024
Biztonsági szemle
File-sharing phishing attacks zero-in on the financial sector
Combine the financial sector’s high online usage and need to make speedy decisions and it’s easy to understand why hackers use file-sharing services to prey on this vertical.

5 Sep 2024
Biztonsági szemle
Malicious JavaScript facilitates Cisco store customer info theft
Such malicious JavaScript code — which is potentially targeted at exfiltrating the credentials of Cisco employees who usually use the site during the checkout process — may have been deployed through the exploitation of the critical XML external...

5 Sep 2024
Biztonsági szemle
Record-breaking DDoS attack averted
Intrusions commenced with a 20-second hit that reached up to 1.7 Gpps before the succeeding deployment of unprecedented Carpet Bomb attacks against the targeted network's subnet IPs the day after, according to Global Secure Layer researchers.

5 Sep 2024
Biztonsági szemle
Malicious payloads deployed via MacroPack framework
Attacks from a China-based command-and-control server involved MacroPack-based documents uploaded from China-, Taiwan-, and Pakistan-based IP addresses that ordered the installation of macros that facilitated Brute Ratel and Havoc distribution...

5 Sep 2024
Biztonsági szemle
Expanded data theft integrated in rebranded Rage Stealer malware
Aside from leveraging Telegram bot API to facilitate stealthier exfiltration of targeted devices' sensitive and personal data, Angry Stealer has also been enhanced with the "MotherRussia.exe" payload, which could enable further malicious activity.

5 Sep 2024
Biztonsági szemle
US cracks down on election-targeted Russian influence operations
Under the "Doppelganger" influence campaign, ANO Dialog, Structura National Technology, and the Social Design Agency have been ordered by Russian President Vladimir Putin's First Deputy Chief of Staff Sergei Kiriyenko to spread disinformation meant...
Pagination
- Previous page ‹‹
- Page 389
- Next page ››