Security Bulletin
19 Jan 2024
Biztonsági szemle
Ransomware Actor Uses TeamViewer to Gain Initial Access to Networks
Attackers have increasingly leveraged the widely used remote access tool, installed on hundreds of millions of endpoints, to break into victim environments.
19 Jan 2024
Biztonsági szemle
Massive Data Breach at VF Hits 35M Vans, Retail Customers
A month on from a retail conglomerate's data breach, it's still not clear exactly what the hackers stole, but impacted brands include Dickies, Northface, Timberland, Vans, and more.
19 Jan 2024
Biztonsági szemle
TAG Bulletin: Q4 2023
This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2023. It was last updated on January 19, 2024.OctoberWe terminated 8 Y…
19 Jan 2024
Biztonsági szemle
Why we need more continuous hands-on training and fewer cybersecurity certifications
The industry needs to break away from old-style certifications and focus more on continuous improvement, hands-on training, and realistic simulations.
19 Jan 2024
Biztonsági szemle
Third Ivanti Vulnerability Exploited in the Wild, CISA Reports
Though reports say this latest Ivanti bug is being exploited, it's unclear exactly how threat actors are using it.
19 Jan 2024
Biztonsági szemle
ColdRiver threat group targeting critical infrastructure with backdoor attacks
Russia-backed threat group targeting critical infrastructure and leading NGOs and NATO governments, including attacks on U.S. nuclear research facilities.
19 Jan 2024
Biztonsági szemle
CISOs Struggle for C-Suite Status Even as Expectations Skyrocket
An IANS survey shows that CISOs shoulder more and more legal and regulatory liability for data breaches, but few are getting the recognition or support they need.
19 Jan 2024
Biztonsági szemle
Microsoft: Iran's Mint Sandstorm APT Blasts Educators, Researchers
The Charming Kitten-related cyber-espionage group is posing as legitimate journalists and researchers to get intel on the Israel-Hamas war.
19 Jan 2024
Biztonsági szemle
Missing the Cybersecurity Mark With the Essential Eight
Australia's Essential Eight Maturity Model still doesn't address key factors needed to protect today's cloud and SaaS environments.
19 Jan 2024
Biztonsági szemle
iPhone, Android Ambient Light Sensors Allow Stealthy Spying
Ambient light sensors on smart-device screens can effectively be turned into a camera, opening up yet another path to snooping on unwitting victims.
19 Jan 2024
Biztonsági szemle
CISA's Road Map: Charting a Course for Trustworthy AI Development
The agency aims to build a more robust cybersecurity posture for the nation.
19 Jan 2024
Biztonsági szemle
Driving a Cloud Operating Model in Education
The Cloud Operating Model helps IT build and manage an infrastructure that allows them to quickly diagnose and resolve network issues so teaching, learning and services can continue uninterrupted.
Pagination
- Previous page ‹‹
- Page 1107
- Next page ››