Security Bulletin
18 Apr 2024
Biztonsági szemle
Novel Kapeka backdoor leveraged in Sandworm attacks
Ukraine, Estonia, and other countries in Eastern Europe have been targeted by Russian state-backed advanced persistent threat operation Sandworm, also known as APT44 and Seashell Blizard, in attacks distributing the new Kapeka malware, also known as...
18 Apr 2024
Biztonsági szemle
US, European water utility attacks linked to Sandworm
Water and hydroelectric utilities in the U.S. and Europe have been subjected to attacks by Russian state-sponsored advanced persistent threat operation Sandworm, also known as APT44, since earlier this year, The Register reports.
18 Apr 2024
Biztonsági szemle
The evolution of privilege: How to secure your organization in an era of escalating workforce privileges
The line between standard and privileged users is blurring as the standard user often has access to sensitive data and can perform high-risk actions as part of their daily activities, making them ripe targets for cyber threats. Here's what to know...
18 Apr 2024
Biztonsági szemle
Tájékoztatás Adobe szoftverek sérülékenységeiről – 2024. április
Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) tájékoztatót ad ki az Adobe szoftverfejlesztő cég termékeit érintő sérülékenységekkel kapcsolatban, azok súlyossága, valamint az egyes biztonsági hibákat...
18 Apr 2024
Biztonsági szemle
Riasztás Microsoft termékeket érintő sérülékenységekről – 2024. április
Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) riasztást ad ki a Microsoft szoftvereket érintő kritikus kockázati besorolású sérülékenységek kapcsán, azok súlyossága, kihasználhatósága és a szoftverek...
18 Apr 2024
Biztonsági szemle
Sneaky Shellcode: Windows Fibers Offer EDR-Proof Code Execution
Two new code-execution techniques, Poison Fiber and Phantom Thread, take advantage of a little-known Windows OS workhorse to sneak shellcode and other malware onto victim machines.
18 Apr 2024
Biztonsági szemle
Nigeria & Romania Ranked Among Top Cybercrime Havens
A survey of cybercrime experts assessing the top cybercrime-producing nations results in some expected leaders — Russia, Ukraine, and China — but also some surprises.
18 Apr 2024
Biztonsági szemle
Open Source Tool Looks for Signals in Noisy AWS Cloud Logs
Permiso Security announced Cloud Console Cartographer during Black Hat Asia to help defenders look inside Amazon Web Services events logs for signs of cyberattacks.
18 Apr 2024
Biztonsági szemle
Countering Voice Fraud in the Age of AI
Caller ID spoofing and AI voice deepfakes are supercharging phone scams. Fortunately, we have tools that help organizations and people protect themselves against the devious combination.
18 Apr 2024
Biztonsági szemle
For Service Accounts, Accountability Is Key to Security
Modern networks teem with machine accounts tasked with simple automated tasks yet given too many privileges and left unmonitored. Resolve that situation and you close an attack vector.
Pagination
- Previous page ‹‹
- Page 620
- Next page ››