Security Bulletin
1 Oct 2024
Biztonsági szemle
Impact of Patelco Credit Union breach more severe than previously thought
Infiltration of Patelco's systems on May 23 enabled the exfiltration of individuals' names, birthdates, Social Security numbers, driver's license numbers, and/or email addresses although the stolen information varied among impacted individuals...
1 Oct 2024
Biztonsági szemle
Diehl Defence reportedly attacked by Kimsuky APT
Kimsuky was discovered by Google Mandiant researchers to have deployed spear-phishing attacks involving contract lures with U.S. defense contractors redirecting to fraudulent login pages spoofing those of a telecommunications firm and an email...
1 Oct 2024
Biztonsági szemle
Cyberattack disrupts Agence France-Presse's IT systems
Additional details regarding the extent or perpetrators of the breach were not provided but the French international news agency said that global news coverage had not been affected by the intrusion while noting an ongoing investigation into the...
1 Oct 2024
Biztonsági szemle
Third-party zero-day leveraged to breach certain Rackspace servers
Threat actors leveraged the zero-day to infiltrate three of Rackspace's internal monitoring web servers with the ScienceLogic app and the third-party utility, facilitating access to customers' account names and numbers, usernames, Rackspace...
1 Oct 2024
Biztonsági szemle
Thread hijacking intrusion thwarted by Darktrace
Such an intrusion involved threat actors compromising a software-as-a-service user's email account to determine potentially exploitable conversations where they could deliver an email purporting to be a reply to a message about tax and payment...
1 Oct 2024
Biztonsági szemle
Officials: Combating ransomware requires intensified crackdowns
More aggressive offensive measures were emphasized by officials to be crucial in foiling increasingly prevalent post-takedown recovery efforts by ransomware operations ahead of this week's International Counter Ransomware Initiative meeting.
1 Oct 2024
Biztonsági szemle
Infrastructure vs. Runtime — Where Are Your Priorities?
Amid the noise of new solutions and buzzwords, understanding the balance between securing infrastructure and implementing runtime security is key to crafting an effective cloud strategy.
1 Oct 2024
Biztonsági szemle
What are your pet peeves when it comes to tool selection? - Timothy Ball - CSP #194
1 Oct 2024
Biztonsági szemle
ADR: Taking threat detection and response 'below the waterline'
By planting agents inside code running in production, a new generation of application security tools make it possible to get better at detecting hidden threats that lurk in the application layer.
1 Oct 2024
Biztonsági szemle
The US doesn’t need another task force on the Chinese cyber threat
Let’s not waste almost two years holding hearings while China continues its attacks – increase the cyber budget and get to work.
1 Oct 2024
Biztonsági szemle
UAE, Saudi Arabia Become Plum Cyberattack Targets
Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web.
1 Oct 2024
Biztonsági szemle
Cybersecurity experts praise veto of California's AI safety bill
Despite its good intentions, many experts said the bill took a flawed approach to regulating AI safety.
Pagination
- Previous page ‹‹
- Page 423
- Next page ››