Security Bulletin
![Source PC website developer. Real software development code. JavaScript code in text editor. Computer interface. Abstract technology background. Java Software engineer concept.](/sites/default/files/styles/narrow_1x/public/feeds/52/030323_javascript.jpg.webp?itok=aLmuSRnj)
24 May 2024
Biztonsági szemle
Supply chain attack hits courtroom recording platform
Widely used Justice AV Solutions Viewer courtroom recording software has been subjected to a supply chain attack involving the deployment of a backdoor that enabled total system takeover, according to The Record, a news site by cybersecurity firm...
![Malicious computer programming code in the shape of a skull.](/sites/default/files/styles/narrow_1x/public/feeds/d4/040424_ransomware.jpg.webp?itok=KPpI71mi)
24 May 2024
Biztonsági szemle
Novel ShrinkLocker ransomware exploits Microsoft BitLocker
Organizations in the steel and vaccine manufacturing sectors, as well as a government entity in Mexico, Jordan, and Indonesia have been subjected to attacks with the novel ShrinkLocker ransomware strain that exploits Microsoft BitLocker for file...
![Chinese hacker. Laptop with binary computer code and china flag](/sites/default/files/styles/narrow_1x/public/feeds/df/031924_china_flag.jpg.webp?itok=2CIBVinP)
24 May 2024
Biztonsági szemle
Ongoing Chinese cyberespionage operation targets government orgs
Chinese advanced persistent threat operation TGR-STA-0043, previously tracked as CL-STA-0043, has targeted at least seven government organizations across Asia, Africa, and the Middle East as part of the Operation Diplomatic Specter cyberespionage...
![Phishing](/sites/default/files/styles/narrow_1x/public/feeds/0e/0725_phishing.jpg.webp?itok=DcEwHLz9)
24 May 2024
Biztonsági szemle
Cyberespionage schemes leveraged in escalating Moroccan gift card theft campaign
Moroccan hacking operation Storm-0539, also known as Ant Lion, has ramped up its gift card theft activities with cyberespionage tactics ahead of the Memorial Day holiday, according to BleepingComputer.
![](/sites/default/files/styles/narrow_1x/public/feeds/5b/Kittipong-irasukhanont_Alamy-Stock-Photo.jpg.webp?itok=RoTKStga)
24 May 2024
Biztonsági szemle
Future-Proof Your Cybersecurity AI Strategy
An effective, long-term XDR strategy will address the ongoing need for rapid analysis and continual vetting of the latest threat intelligence.
24 May 2024
Biztonsági szemle
Cisco Releases May 2024 Cisco ASA, FMC, and FTD Software Security Publication
Cisco released a bundled publication for security advisories that address vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Management Center (FMC), and Firepower Threat Defense (FTD) software. A cyber threat actor could exploit...
![Non-Human Identiies](/sites/default/files/styles/narrow_1x/public/feeds/ee/052324_robot_ai.jpg.webp?itok=7-RAQ9At)
24 May 2024
Biztonsági szemle
There are no bad machines – only ones that behave badly because of human error
Protecting non-human identities has become a real challenge – here’s what to do about them.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
24 May 2024
Biztonsági szemle
Sajtószemle – 2024. 21. hét
A 2024. 21. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.05.17. és 2024.05.23. között kezelt incidensek statisztikai adatait is tartalmazza.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
24 May 2024
Biztonsági szemle
ISC Stormcast For Friday, May 24th, 2024 https://isc.sans.edu/podcastdetail/8996, (Fri, May 24th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/08/ai-Mopic-Alamy.jpg.webp?itok=hhYCfDMg)
24 May 2024
Biztonsági szemle
CyberArk Goes All In on Machine Identity with Venafi Deal
CyberArk's $1.54 billion agreement to buy Venafi is a sign of how human and machine identities will converge with certificate lifecycle management.
![](/sites/default/files/styles/narrow_1x/public/feeds/d3/325351_DR23_Graphics_General_Large_Text_v1.png.webp?itok=t_2x_glb)
23 May 2024
Biztonsági szemle
Concentric AI to Unveil Data Security Remediation and Compliance Reporting Capabilities at Infosecurity Europe 2024
![](/sites/default/files/styles/narrow_1x/public/feeds/db/cockpit-JLBvdWOLF-alamy.jpg.webp?itok=h_Zqe4Jb)
23 May 2024
Biztonsági szemle
Seizing Control of the Cloud Security Cockpit
Much like an airplane's dashboard, configurations are the way we control cloud applications and SaaS tools. It's also the entry point for too many security threats. Here are some ideas for making the configuration process more secure.
Pagination
- Previous page ‹‹
- Page 125
- Next page ››