Security Bulletin
![iProov's Andrew Bud](/sites/default/files/styles/narrow_1x/public/feeds/fc/061324_iproov_andrew_bud.jpg.webp?itok=mm14X7Ur)
13 Jun 2024
Biztonsági szemle
The threat of deepfakes to remote identity verification systems
Remote identity verification is one of the biggest challenges in the digital age, especially with the use of AI-generated deepfakes which are now impossible to distinguish from real imagery with the human eye.
![Saviynt's Vibhuti Sinha](/sites/default/files/styles/narrow_1x/public/feeds/90/061324_saviynt_vibhuti_sinha.jpg.webp?itok=syWBh98O)
13 Jun 2024
Biztonsági szemle
The future of identity management: Transitioning from operational to intelligent platforms
With identity being the new security perimeter, identity platforms are now an integral part of the core security stack.
![](/sites/default/files/styles/narrow_1x/public/feeds/22/bug_code%281820%29_Phichak_Alamy.jpg.webp?itok=2iO6GLzq)
13 Jun 2024
Biztonsági szemle
PoC Exploit Emerges for Critical RCE Bug in Ivanti Endpoint Manager
A new month, a new high-risk Ivanti bug for attackers to exploit — this time, an SQL injection issue in its centralized endpoint manager.
![](/sites/default/files/styles/narrow_1x/public/feeds/1f/Hacker%281800%29_Igor_Stevanovic_Alamy.jpg.webp?itok=YhCVr0Hm)
13 Jun 2024
Biztonsági szemle
North Korea's Moonstone Sleet Widens Distribution of Malicious Code
The recently identified threat actor uses public registries for distribution and has expanded capabilities to disrupt the software supply chain.
![High speed ethernet network cables plugged into a network switch for seamless connectivity](/sites/default/files/styles/narrow_1x/public/feeds/94/061324_network_cables.jpg.webp?itok=Y2sUz8f9)
13 Jun 2024
Biztonsági szemle
Life360 says hacker stole customer data from its Tile support platform
No sensitive customer data was stolen, according to maker of Bluetooth tracker.
![](/sites/default/files/styles/narrow_1x/public/feeds/3f/AIchatbotrobot_tanit_boonruen_AlamyStockPHoto.jpg.webp?itok=iJ0RpqUp)
13 Jun 2024
Biztonsági szemle
AI Chatbot Fools Scammers & Scores Money-Laundering Intel
Experiment demonstrates how AI can turn the tables on cybercriminals, capturing bank account details of how scammers move stolen funds around the world.
![](/sites/default/files/styles/narrow_1x/public/feeds/99/040524_ai_chip_brain.jpg.webp?itok=84vwnLAj)
13 Jun 2024
Biztonsági szemle
GenAI an enhancement for cyberattackers and defenders
Perception Point official says the “highest bar is full automation of the attack process.”
![Managing secrets in the cloud](/sites/default/files/styles/narrow_1x/public/feeds/1c/060524_cloud_security.jpg.webp?itok=S4YJEutW)
13 Jun 2024
Biztonsági szemle
Third-party breach confirmed by Cylance
BlackBerry-owned cybersecurity firm Cylance has confirmed having its data compromised as a result of a "third-party platform" breach following a post by the threat actor dubbed "Sp1d3r" peddling the exfiltrated information for $750,000...
![](/sites/default/files/styles/narrow_1x/public/feeds/28/microsoft_Robert_K._Chin_alamy.jpg.webp?itok=suY-9elh)
13 Jun 2024
Biztonsági szemle
Microsoft, Late to the Game on Dangerous DNSSEC Zero-Day Flaw
Why the company took so long to address the issue is not known given that most other stakeholders had a fix out for the issue months ago.
![PHP code lines on a monitor](/sites/default/files/styles/narrow_1x/public/feeds/45/060724_php_code.jpg.webp?itok=yYMUKhHS)
13 Jun 2024
Biztonsági szemle
New consortium seeks to bolster Rust use in safety-critical systems
Inadequate resources supporting safety-critical systems in the Rust ecosystem have prompted the Rust Foundation to establish the new Safety-Critical Rust Consortium alongside several other organizations in a bid to advance responsible usage of the...
![Phishing Alert text button on keyboard](/sites/default/files/styles/narrow_1x/public/feeds/ff/0705_phishing.jpg.webp?itok=q5EXKjje)
13 Jun 2024
Biztonsági szemle
Most impersonated sectors, brands in phishing examined
Hackread reports that organizations in the IT and technology industry were most spoofed in phishing scams between January 2020 and March 2024, followed by those in the banking and financial services sector.
![](/sites/default/files/styles/narrow_1x/public/feeds/ef/Cybercrime%281800%29_Igor_Stevanovic_Alamy.jpg.webp?itok=KRBA26Z2)
13 Jun 2024
Biztonsági szemle
How Cybercrime Empires Are Built
Strong partnerships and collaborations between industry and law enforcement are the most critical ways to take down cybercrime groups before they grow.
Pagination
- Previous page ‹‹
- Page 65
- Next page ››