Security Bulletin

16 Aug 2024
Biztonsági szemle
Are 2024 US Political Campaigns Prepared for the Coming Cyber Threats?
When it comes to this year's candidates and political campaigns fending off major cyberattacks, a lot has changed since the 2016 election cycle.

16 Aug 2024
Biztonsági szemle
Thousands of Oracle NetSuite E-Commerce Sites Expose Sensitive Customer Data
Users of Oracle's ERP for Web storefronts might not be aware of a misconfiguration which could put customer data at risk of exposure.

16 Aug 2024
Biztonsági szemle
RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary
After loading a vulnerable driver, the utility uses a public exploit to gain privilege escalation and the ability to disable endpoint protection software.

16 Aug 2024
Biztonsági szemle
CISA, FBI Assure American Voters of Cyber-Safe Electoral Process
Though it is possible for cyber disruptions to occur, CISA and the FBI say that ransomware will not impact casting or counting ballots.

16 Aug 2024
Biztonsági szemle
Why Are Organizations Losing the Ransomware Battle?
Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving threats.

16 Aug 2024
Biztonsági szemle
Securing the developer pipeline: The evolving role of the CISO in today’s threat landscape
Paul Davis, Field CISO at Jfrog, delves into the critical challenges facing today’s information security leaders, particularly in securing development workflows.

16 Aug 2024
Biztonsági szemle
US probe on TP-Link sought amid Chinese cyberattack concerns
Conducting a federal probe on TP-Link was noted by the lawmakers to be crucial following reports that known TP-Link firmware and instance vulnerabilities were leveraged by threat actors to compromise European government officials.

16 Aug 2024
Biztonsági szemle
Critical vulnerabilities in open-source tools for AI identified
Attackers could have leveraged the issue in the Setuptools Python package — which is used to facilitate Python library management and installation in AI models — to enable arbitrary code execution via specially crafted package URLs.

16 Aug 2024
Biztonsági szemle
Industrial firms face ransomware spike in second quarter
Most attacks continued to be aimed at U.S. and European industrial firms, particularly those involved in manufacturing, according to a Dragos report.

16 Aug 2024
Biztonsági szemle
Ransomware attack proceeds, crypto theft rise in first half
Ransomware attack earnings rose by $10 million to more than $459 million during the first half of this year, with proceeds poised to reach a record high by year-end amid the increasing prevalence of ransomware intrusions this year.

16 Aug 2024
Biztonsági szemle
Kentucky county's clerk's office breached in RansomHub attack
Included in the 47 GB data exfiltrated from the county clerk's office's systems were financial documents, customer contracts, alarm system information, budget details, ballot information, and voter records as early as 2008, claimed RansomHub.

16 Aug 2024
Biztonsági szemle
Updated Gafgyt botnet exploits GPU for cryptomining
Malicious payloads delivered following the brute-force attacks enabled XMRig deployment via "systemd-net" and the termination of other malware, as well as the execution of the Id-musl-x86 SSH scanner to facilitate malware spread.
Pagination
- Previous page ‹‹
- Page 416
- Next page ››