Security Bulletin
22 Feb 2024
Biztonsági szemle
Sophisticated PlugX backdoor variant leveraged in Mustang Panda attacks
Numerous countries across Asia, including Taiwan, Vietnam, India, Japan, and China, have been targeted by Chinese state-backed advanced persistent threat operation Mustang Panda.
22 Feb 2024
Biztonsági szemle
Cyberattack disrupts Change Healthcare
TechCrunch reports that major U.S. healthcare revenue and payment cycle management provider Change Healthcare had its systems targeted by a cyberattack on Feb. 20, which resulted in the loss of access across most of the prescription processor's login...
22 Feb 2024
Biztonsági szemle
Accelerated cyberattack velocity, mounting cloud attacks reported
Cyberattacks have become quicker and intrusions against cloud environments have become more prevalent during the past year, according to SiliconAngle.
22 Feb 2024
Biztonsági szemle
Novel Wi-Fi flaw could trigger widespread hacks, experts
Android, ChromeOS, and Linux devices are being impacted by a pair of authentication bypass vulnerabilities within open-source Wi-Fi management software wpa_supplicant.
22 Feb 2024
Biztonsági szemle
Microsoft expands security logging to all federal agencies
Microsoft has announced that it will be expanding security logs across all federal agencies this month.
22 Feb 2024
Biztonsági szemle
Insurers Use Claims Data to Recommend Cybersecurity Technologies
Policy holders using certain technologies — such as managed detection and response (MDR) services, Google Workspace, and email security gateways — gain premium discounts from cyber insurers.
22 Feb 2024
Biztonsági szemle
Attackers target Confluence flaws with SSH-Snake pentesting tool
The fileless, self-modifying, worm-like network traversal tool automatically searches for SSH keys.
22 Feb 2024
Biztonsági szemle
US sounds cybersecurity alarm over water systems in latest wave of China-linked warnings
The past few weeks have indicated that the US has shifted and will continue a more offensive cyberwarfare approach in the coming months.
22 Feb 2024
Biztonsági szemle
Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft
Vulnerability CVE-2024-23204, affecting Apple's popular Shortcuts app, suggests a critical need for ongoing security awareness in the macOS and iOS ecosystem.
22 Feb 2024
Biztonsági szemle
Russian Cyberattackers Launch Multiphase PsyOps Campaign
Operation Texonto spanned several months, using various Russian propaganda lures and spear-phishing to misinform and trick users into giving up Microsoft 365 credentials.
22 Feb 2024
Biztonsági szemle
Identify Weak Links in Your Application Stack – Part 2, Anomaly Detection
How can you learn what’s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.
22 Feb 2024
Biztonsági szemle
Webex Connect’s Second Quarter
Checking in on Webex Connect’s second quarter at the Cisco Store.
Pagination
- Previous page ‹‹
- Page 1030
- Next page ››