Security Bulletin
![Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen](/sites/default/files/styles/narrow_1x/public/feeds/70/1109_security_breach.jpg.webp?itok=YNmgWT47)
14 May 2024
Biztonsági szemle
City of Helsinki security breach exposes information of over 80K people
Security Affairs reports that the city of Helsinki, Finland has experienced a data breach affecting more than 80,000 people and the Police of Finland have begun investigating the matter after the breach was reported by the city.
![Detailed view of a computer screen with the word "HACKED" displayed prominently](/sites/default/files/styles/narrow_1x/public/feeds/36/041124_hacked.jpg.webp?itok=kRjFMI1b)
14 May 2024
Biztonsági szemle
Hacker under investigation by Europol after classified data offered for sale
IntelBroker, a well-known black hat hacker, is being investigated by Europol after he offered classified data purportedly stolen from the agency's system for sale, SecurityWeek reports.
![A headset with a telephone](/sites/default/files/styles/narrow_1x/public/feeds/2c/1108_callcenter_headset.jpg.webp?itok=I6zC5cSc)
14 May 2024
Biztonsági szemle
FCC tags new classification system's first robocall threat actor
The Record, a news site by cybersecurity firm Recorded Future, reports that the Federal Communications Commission announced that an entity known as Royal Tiger has been designated as the first group tagged through its new threat analysis and...
![](/sites/default/files/styles/narrow_1x/public/feeds/92/021224_ransomware.jpg.webp?itok=Q3vOUam5)
14 May 2024
Biztonsági szemle
Cybercriminal puts INC Ransom source code up for sale
A cybercriminal who has assumed the name "salfetka" is purportedly selling the source code for the INC Ransom ransomware-as-a-service operation, BleepingComputer reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/8d/Wendy-MoM-and-Dad.jpeg.webp?itok=Gt9XKVyO)
14 May 2024
Biztonsági szemle
Using Cisco’s Benefits To Ease Difficult Times: The Bridge To Giving Yourself Grace
When Strategy and Planning Manager Wendy S. joined Cisco full-time, she knew she had access to incredible benefits she now leans on for support and well-being.
14 May 2024
Biztonsági szemle
Rockwell Automation FactoryTalk Remote Access
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.0 ATTENTION: Low attack complexity Vendor: Rockwell Automation Equipment: Factory Talk Remote Access Vulnerability: Unquoted Search Path or Element 2. RISK EVALUATION Successful exploitation of this...
14 May 2024
Biztonsági szemle
Microsoft Releases May 2024 Security Updates
Title: Microsoft Releases May 2024 Security Updates Content: Microsoft has released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected...
14 May 2024
Biztonsági szemle
Apple Releases Security Updates for Multiple Products
Apple has released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS, and tvOS. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. Users and administrators are...
14 May 2024
Biztonsági szemle
CISA Releases Four Industrial Control Systems Advisories
CISA released four Industrial Control Systems (ICS) advisories on May 14, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-135-01 Rockwell Automation FactoryTalk...
14 May 2024
Biztonsági szemle
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-30051 Microsoft DWM Core Library Privilege Escalation Vulnerability CVE-2024-30040 Microsoft Windows MSHTML...
14 May 2024
Biztonsági szemle
Johnson Controls Software House C-CURE 9000
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.7 ATTENTION: Low attack complexity Vendor: Johnson Controls Equipment: Software House C●CURE 9000 Vulnerability: Insertion of Sensitive Information into Log File 2. RISK EVALUATION Successful exploitation of...
Pagination
- Previous page ‹‹
- Page 158
- Next page ››