Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/f9/cuttlefish-David_Fleetham-Alamy.jpg.webp?itok=SBsbpek0)
1 May 2024
Biztonsági szemle
'Cuttlefish' Zero-Click Malware Steals Private Cloud Data
The newly discovered malware, which has so far mainly targeted Turkish telcos and has links to HiatusRat, infects routers and performs DNS and HTTP hijacking attacks on connections to private IP addresses.
![](/sites/default/files/styles/narrow_1x/public/feeds/f7/AI-programming-languages-featured-scaled.jpg.webp?itok=CLifZTAq)
1 May 2024
Biztonsági szemle
Which Programming Language to Choose for AI?
Python? C++? Java? JavaScript? R? Julia?... As is usually the case, it depends on your context, methods, and use-case which programming language is right for your AI project.
![The FBI seal is seen on its headquarters at the J. Edgar Hoover FBI building in Washington.](/sites/default/files/styles/narrow_1x/public/feeds/16/1114_fbi_seal.jpg.webp?itok=OY4QCx04)
1 May 2024
Biztonsági szemle
Significant drop recorded in FBI searches of Section 702 database
Only more than 57,000 searches were conducted by the FBI on the database of Section 702 of the Foreign Intelligence Surveillance Act in 2023, representing an over 50% decrease in queries from the previous year that a senior FBI official said was due...
![ISC Knowledge Base](/sites/default/files/styles/narrow_1x/public/2023-10/ISC-logo-rgb-2048x1149.png.webp?itok=ICtukOrO)
1 May 2024
Biztonsági szemle
How to Report or Inquire About Security Issues
ISC does not pay bug bounties. If you suspect you have found a security defect in BIND, ISC DHCP, Kea DHCP, or Stork, or if you wish to inquire about a security issue that you have learned about which has not yet been publicly announced, ISC requests...
![](/sites/default/files/styles/narrow_1x/public/feeds/73/shutterstock_2153929739-1.jpg.webp?itok=XExSQfVZ)
1 May 2024
Biztonsági szemle
Beyond visibility, there’s observability
Full-stack observability offers comprehensive monitoring, tracking, and analysis of applications, their dependencies and related infrastructure across all layers and components to gain real-time insights into application performance. Read the IDC...
![Jen Easterly speaks at a podium](/sites/default/files/styles/narrow_1x/public/feeds/16/050124_jen_easterly.jpg.webp?itok=QyCOfnHR)
1 May 2024
Biztonsági szemle
China's attacks on critical infrastructure ‘tip of the iceberg'
CISA Director Jen Easterly told lawmakers that Chinese cyberespionage threats warrants budget boost.
![American cash banknotes money](/sites/default/files/styles/narrow_1x/public/feeds/81/030323_cash_money.jpg.webp?itok=d_CNwBEV)
1 May 2024
Biztonsági szemle
Funding round secures $15M for Corelight
SiliconAngle reports that leading open network detection and response startup Corelight has landed $150 million from a Series E funding round.
![Internet of Things (IoT)](/sites/default/files/styles/narrow_1x/public/feeds/68/050124_internet_of_things.jpg.webp?itok=icD3tRc1)
1 May 2024
Biztonsági szemle
UK cracks down on default passwords for smart devices
The UK has become the first country worldwide to prohibit Internet of Things device manufacturers from using default usernames and passwords in their products following the approval of the Product Security and Telecommunications Infrastructure act...
![](/sites/default/files/styles/narrow_1x/public/feeds/a8/Merger_Cagkan_Sayin_Alamy.jpg.webp?itok=O3K6Sk7C)
1 May 2024
Biztonsági szemle
The Cybersecurity Checklist That Could Save Your M&A Deal
With mergers and acquisitions making a comeback, organizations need to be sure they safeguard their digital assets before, during, and after.
![The United States Capitol building is seen at sunrise in Washington](/sites/default/files/styles/narrow_1x/public/feeds/d6/041024_us_capitol.jpg.webp?itok=_U4MQ9Km)
1 May 2024
Biztonsági szemle
FTC urged to probe automakers' location data sharing practices
The Federal Trade Commission has been sought by Sens. Ron Wyden, D-Ore., and Ed Markey, D-Mass., to launch an investigation into major automakers' driver location data sharing practices after a congressional probe showed that only five of 14 car...
![Microsoft logo at the company office building located in Munich, Germany](/sites/default/files/styles/narrow_1x/public/feeds/df/011024_microsoft_logo.jpg.webp?itok=6Co0llBu)
1 May 2024
Biztonsági szemle
Microsoft vulnerability prevalence slightly declines
Microsoft recorded 1,228 security vulnerabilities in 2023, representing a 5% decline from the year prior and the steady prevalence of reported security issues since 2020, TechRepublic reports.
![<p>(“Coding Javascript” by Christiaan Colen is licensed under CC BY-SA 2.0)</p>](/sites/default/files/styles/narrow_1x/public/feeds/70/20447259789_e823ae6656_k.jpg.webp?itok=I5cFz7hG)
1 May 2024
Biztonsági szemle
Host takeovers likely with critical Judge0 flaws
SecurityWeek reports that online open-source service Judge0 used for arbitrary code execution within a sandbox has been impacted by three critical vulnerabilities, which could be leveraged to facilitate sandbox escapes, privilege escalation, and...
Pagination
- Previous page ‹‹
- Page 184
- Next page ››