Security Bulletin
26 Oct 2023
Biztonsági szemle
Adverse impact of proposed CISA budget cut warned by official
CyberScoop reports that House Republicans' proposal to reduce Cybersecurity and Infrastructure Security Agency spending by 25% has been noted by CISA Executive Assistant Director for Cybersecurity Eric Goldstein to be "catastrophic," as it would...
26 Oct 2023
Biztonsági szemle
Rorschach ransomware attack disrupts major Chilean telecom provider
Major Chilean telecommunications provider Grupo GTD, which caters to other countries across Latin America, had its data centers, Voice-over-IP, and internet access disrupted following a cyberattack against its infrastructure-as-a-service platform on...
26 Oct 2023
Biztonsági szemle
US plastic surgeon clinic data exposed by Hunters International
Newly emergent ransomware operation Hunters International has exposed pre-operation photos of patients stolen from the systems of a U.S. plastic surgeon's clinic, The Register reports.
26 Oct 2023
Biztonsági szemle
Data breach reported by Seiko following ALPHV/BlackCat ransomware attack
Data breach reported by Seiko following ALPHV/BlackCat ransomware attack Seiko has confirmed that nearly 60,000 items of personal data from the systems of its business units compromised following an ALPHV/BlackCat ransomware attack in August...
26 Oct 2023
Biztonsági szemle
Central Asian governments subjected to YoroTrooper attacks
Suspected Kazakhstan-based threat operation YoroTrooper has launched a widespread cyberespionage campaign against government organizations and officials across Central Asia between May and August, reports The Record, a news site by cybersecurity firm...
26 Oct 2023
Biztonsági szemle
Significant Volt Typhoon threat requires immediate US critical infrastructure action
U.S. critical infrastructure organizations have been urged by Mandiant Intelligence Chief Analyst John Hultquist to accelerate efforts to discover and mitigate threats by Chinese state-sponsored threat operation Volt Typhoon, which has already...
26 Oct 2023
Biztonsági szemle
Iran APT Targets the Mediterranean With Watering-Hole Attacks
Nation-state hackers are using hybrids to ensnare those in the maritime, shipping, and logistics industries.
26 Oct 2023
Biztonsági szemle
‘iLeakage’ side-channel flaw in Apple Safari can share passwords, messages
University researchers say most Apple macOS and IOS devices are vulnerable to iLeakage, but security pros say most companies are not at high risk because exploiting the flaw requires highly skilled reverse engineering skills.
26 Oct 2023
Biztonsági szemle
How to Begin Observability at the Data Source
Observable data has exploded as teams modernize their application stacks and embraced microservices architectures. Learn how Edge Delta helps IT and DevOps teams with a new way to collect, transform, and route your data before it is indexed in a...
26 Oct 2023
Biztonsági szemle
Microsoft: 0ktapus Cyberattackers Evolve to 'Most Dangerous' Status
The English-speaking cyberattack group behind the MGM and Caesars Entertainment attacks is adding unique capabilities and gaining in sophistication. Prepare now, Microsoft says.
26 Oct 2023
Biztonsági szemle
Logging in Kea for ISC DHCP Users
Many administrators are familiar with logging in ISC DHCP and have learned to use it for troubleshooting over the past two decades. Kea can have similar logging although it must be setup properly for this to occur. Kea 2.5.3 required Some log...
26 Oct 2023
Biztonsági szemle
Adventures in Validating IPv4 Addresses, (Thu, Oct 26th)
It should be pretty easy to validate an IP address. IPv4 addresses are 32-bit unsigned integers, and IPv6 addresses are 128-bit unsigned integers. Things get "interesting" when developers attempt to validate IP addresses as a string. There have been...
Pagination
- Previous page ‹‹
- Page 1276
- Next page ››