Security Bulletin
17 Jan 2024
Biztonsági szemle
Three ways enterprises can activate vulnerability prioritization
Here’s why security teams have to prioritize which vulnerabilities cause the most risk to the organization.
17 Jan 2024
Biztonsági szemle
GitHub rotates keys after report of high-severity bug in a production container
Security researchers say if undetected, numerous GitHub repos could have been infected.
17 Jan 2024
Biztonsági szemle
CISA: AWS, Microsoft 365 Accounts Under Active 'Androxgh0st' Attack
Cyberattackers are targeting Apache webservers and websites using the popular Laravel Web application framework in order to steal credentials for the apps.
17 Jan 2024
Biztonsági szemle
Q&A: How One Company Gauges Its Employees' Cybersecurity 'Fluency'
Cybersecurity compliance training is commonplace, but one Jordan-based company has taken an extra step in testing.
17 Jan 2024
Biztonsági szemle
2024 Tech Predictions: Hybrid Collaboration is Here to Stay
Reflections from the Consumer Electronics Show and predictions for the year in tech: How AI will enhance collaboration experiences for hybrid workers to ensure equitable and inclusive meetings as businesses reimagine workspaces to make the office a...
17 Jan 2024
Biztonsági szemle
Sophisticated MacOS Infostealers Get Past Apple's Built-In Detection
Emerging malware variants can evade various static-signature detection engines, including XProtect, as attackers rapidly evolve to challenge defense systems.
17 Jan 2024
Biztonsági szemle
Atlassian Confluence vulnerability enables remote code execution
The critical bug, given a maximum CVSS score of 10 by Atlassian, requires an urgent update to the fixed version to avoid exploitation.
17 Jan 2024
Biztonsági szemle
Nearly 7K WordPress Sites Compromised by Balada Injector
Nearly 200K WordPress sites could be vulnerable to the attack thanks to CVE-2023-6000, lurking in the PopUp Builder plug-in.
17 Jan 2024
Biztonsági szemle
Come Together Right Now, IT Operations Teams
Dynamic shifts in domains and workforce habits require an IT operating model that is just as dynamic—one that fosters collaboration with a common agenda and simplifies all domains of IT operations.
17 Jan 2024
Biztonsági szemle
Strength in Numbers: The Case for Whole-of-State Cybersecurity
WoS cybersecurity creates a united front for governments to defend against threat actors, harden security postures, and protect constituents who depend on services.
17 Jan 2024
Biztonsági szemle
Botnet fuels Androxgh0st malware's punch
“It goes to show that every software vulnerability has some non-minor percentage of people who will never apply the patch in a timely manner," researchers.
17 Jan 2024
Biztonsági szemle
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-6549 Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability CVE-2023-6548 Citrix NetScaler...
Pagination
- Previous page ‹‹
- Page 1114
- Next page ››