Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/42/dprk_panther_media_GmbH_Alamy.jpg.webp?itok=F_Fph4_q)
2 May 2024
Biztonsági szemle
DPRK's Kimsuky APT Abuses Weak DMARC Policies, Feds Warn
Organizations can go a long way toward preventing spoofing attacks by changing one basic parameter in their DNS settings.
![](/sites/default/files/styles/narrow_1x/public/feeds/68/Windows_license_agreement_Nick_Lylak_Alamy.jpg.webp?itok=gei87qq2)
2 May 2024
Biztonsági szemle
Software Security: Too Little Vendor Accountability, Experts Say
Actual legislation is a long shot and a decade away, but policy experts are looking to jump-start the conversation around greater legal liability for insecure software products.
![](/sites/default/files/styles/narrow_1x/public/feeds/58/finland_Taina_Sohlman_alamy.jpg.webp?itok=QndxHXjV)
2 May 2024
Biztonsági szemle
Hacker Sentenced After Years of Extorting Psychotherapy Patients
Two years after a warrant went out for his arrest, Aleksanteri Kivimäki finally has been found guilty of thousands of counts of aggravated attempted blackmail, among other charges.
![2d illustration ransomware computer virus](/sites/default/files/styles/narrow_1x/public/feeds/ca/1120_ransomware.jpg.webp?itok=Gsqa9wXC)
2 May 2024
Biztonsági szemle
Understanding Scattered Spider, and how they perform cloud-centric identity attacks
Scattered Spider has a history of both traditional and hybrid attacks on cloud enterprise environments.
![](/sites/default/files/styles/narrow_1x/public/feeds/6d/1713112629671-1.jpg.webp?itok=_PV_Wq3C)
2 May 2024
Biztonsági szemle
Cisco at NAB2024: Takeaways
Stay ahead of the media curve with Cisco's NAB 2024 insights. Learn about the next-gen of IP Production and more.
![](/sites/default/files/styles/narrow_1x/public/feeds/79/Cisco-Catalyst-9000-series-cover.png.webp?itok=mWMOKLrb)
2 May 2024
Biztonsági szemle
Setting the Standard: Cisco Catalyst switches among the first to achieve ENERGY STAR certification
Three Cisco Catalyst switches — C9200-L, C9300-48P, and C9300-48UXM — are now officially ENERGY STAR® certified by the U.S. Environmental Protection Agency. This certification is yet another step in Cisco's sustainability journey, which we've been...
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12787″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/bc/ESW_360_Thumbnail_Template_97f78276-44c2-4895-bca2-1d0df018dae9.jpg.webp?itok=Saqbw6j3)
2 May 2024
Biztonsági szemle
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
![Cloud Security Misconceptions](/sites/default/files/styles/narrow_1x/public/feeds/4f/XDR_AdobeStockImages_cropped.jpg.webp?itok=p97F2f5A)
2 May 2024
Biztonsági szemle
Continuous threat exposure management (CTEM): What it is and how to achieve it
How continuous threat exposure management (CTEM) discovers, prioritizes, and validates potential risks and aligns remediation with business goals and compliance frameworks.
![SC Media](/sites/default/files/styles/narrow_1x/public/2023-10/sc-media.png.webp?itok=ZnyJkSlZ)
2 May 2024
Biztonsági szemle
Dealing with the Double-Edged Swords of MFA and Zero Trust
Like any security control, identity needs to be reevaluated as threats advance.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
2 May 2024
Biztonsági szemle
Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796, (Thu, May 2nd)
Before diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the devices affected by this vulnerability, produces various wireless equipment that is sometimes sold under different brands and labels. This will make it...
![](/sites/default/files/styles/narrow_1x/public/feeds/e7/credentials_Linaimages_shutterstock.jpg.webp?itok=pjG0TEcQ)
2 May 2024
Biztonsági szemle
Dropbox Breach Exposes Customer Credentials, Authentication Data
Threat actor dropped in to Dropbox Sign production environment and accessed emails, passwords, and other PII, along with APIs, OAuth, and MFA info.
![Dropbox mobile icon app on screen smartphone iPhone. Dropbox is file hosting company Dropbox Inc.](/sites/default/files/styles/narrow_1x/public/feeds/31/050224_dropbox_phone.jpg.webp?itok=vXrO_OA1)
2 May 2024
Biztonsági szemle
Attackers steal API keys, OAuth tokens, in Dropbox Sign breach
Security pros see the Dropbox Sign breach as not just a blow to Dropbox, but a really bad day for electronic signatures.
Pagination
- Previous page ‹‹
- Page 180
- Next page ››