Security Bulletin
![A computer screen displays a digital alert of an email phishing threat, accompanied by a striking red warning sign.](/sites/default/files/styles/narrow_1x/public/feeds/4a/022724_phishing.jpg.webp?itok=l983R0Td)
23 May 2024
Biztonsági szemle
Keylogger delivered via Microsoft Exchange Server exploits
Attacks leveraging Microsoft Exchange Server vulnerabilities to facilitate keylogger malware deployment have been launched against more than 30 government, financial, education, and IT organizations in Africa and the Middle East since 2021, reports...
![Data protection, binary code with China flag](/sites/default/files/styles/narrow_1x/public/feeds/db/020824_china_flag.jpg.webp?itok=JJVdxGOq)
23 May 2024
Biztonsági szemle
Escalating Chinese cyber threats drive US efforts to secure critical infrastructure
National Cyber Director Harry Coker noted that the U.S. has intensified defending its critical infrastructure amid mounting cyber threats posed by Chinese state-sponsored threat operations, including Volt Typhoon, CyberScoop reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/6e/Meeting_Andriy_Popov_Alamy.jpg.webp?itok=x9kxgIqO)
23 May 2024
Biztonsági szemle
Persistent Burnout Is Still a Crisis in Cybersecurity
Burnout has been an oft-reported problem among security professionals for years. Are there any new ideas for supporting mental health in the industry?
![Email security](/sites/default/files/styles/narrow_1x/public/feeds/83/052224_assembly_line.jpg.webp?itok=Mk5SrMTA)
23 May 2024
Biztonsági szemle
Why email attacks still loom as a major threat to critical infrastructure sectors
Most everyone uses email and critical infrastructure sectors are high-profit industries that deploy legacy technology easy to exploit, so attackers take advantage of the easy access via email to make hefty profits.
![](/sites/default/files/styles/narrow_1x/public/feeds/99/china_hacker_Rokas_Tenys_Alamy_.jpg.webp?itok=b3RY1BVf)
23 May 2024
Biztonsági szemle
China APT Stole Geopolitical Secrets From Middle East, Africa & Asia
One of China's biggest espionage operations owes its success to longstanding Microsoft Exchange bugs, open source tools, and old malware.
![](/sites/default/files/styles/narrow_1x/public/feeds/d2/excutive-board.jpg.webp?itok=TdLiSG8k)
22 May 2024
Biztonsági szemle
State of CISO Leadership: 2024
A CISO job description is a moving target in 2024 as these security leaders face new twists on employment challenges, a 'hostile' regulatory climate and a bevy of new internal and external digital threats.
![Cybersecurity, essential technology, Businesses utilizing advanced cybersecurity technology on a global network, protection and defense, safeguarding critical data and ensuring digital securityCybersecurity, essential technology, Businesses utilizing advanced cybersecurity technology on a global network, protection and defense, safeguarding critical data and ensuring digital security](/sites/default/files/styles/narrow_1x/public/feeds/9a/052224_encryption.jpg.webp?itok=JNICTbnC)
22 May 2024
Biztonsági szemle
Extracting data from encrypted virtual disks: six methods
For incident responders, a variety of techniques for information retrieval from locked-up VMs.
![](/sites/default/files/styles/narrow_1x/public/feeds/21/Healthcare_Olekcii_Mach_Alamy.jpg.webp?itok=9dAOvx8m)
22 May 2024
Biztonsági szemle
US Pumps $50M Into Better Healthcare Cyber Resilience
Upgrade, an ARPA-H program, will focus on automating cybersecurity for healthcare institutions so that providers can focus on patient care.
![](/sites/default/files/styles/narrow_1x/public/feeds/31/GitHub_SOPA_Images_Limited_alamy.jpg.webp?itok=anSPK5fq)
22 May 2024
Biztonsági szemle
GitHub Authentication Bypass Opens Enterprise Server to Attackers
The max-severity bug affects versions using the SAML single sign-on mechanism.
![<p>POZNAN, POL – FEB 6, 2021: Laptop computer displaying logo of Veeam Software, an IT company that develops backup, disaster recovery and intelligent data management software</p>](/sites/default/files/styles/narrow_1x/public/feeds/8e/AdobeStock_420242473_Editorial_Use_Only-scaled.jpeg.webp?itok=in4SL3bj)
22 May 2024
Biztonsági szemle
Veeam patches critical flaw that puts enterprise backups at risk
The bug enables unauthenticated attackers to log into the Veeam Backup Enterprise Manager.
![Developer programmer using laptop with warning triangle sign for alert found error and maintenance concept](/sites/default/files/styles/narrow_1x/public/feeds/6e/052224_alert.jpg.webp?itok=GBG3KXsX)
22 May 2024
Biztonsági szemle
Rockwell to customers: Remove public-facing ICS devices from internet
The move by Rockwell Automation was in response to heightened global tensions and concerns about potential attacks on critical infrastructure.
Pagination
- Previous page ‹‹
- Page 96
- Next page ››