Security Bulletin
![Microsoft logo at the company office building located in Munich, Germany](/sites/default/files/styles/narrow_1x/public/feeds/df/011024_microsoft_logo.jpg.webp?itok=6Co0llBu)
1 May 2024
Biztonsági szemle
Microsoft vulnerability prevalence slightly declines
Microsoft recorded 1,228 security vulnerabilities in 2023, representing a 5% decline from the year prior and the steady prevalence of reported security issues since 2020, TechRepublic reports.
![<p>(“Coding Javascript” by Christiaan Colen is licensed under CC BY-SA 2.0)</p>](/sites/default/files/styles/narrow_1x/public/feeds/70/20447259789_e823ae6656_k.jpg.webp?itok=I5cFz7hG)
1 May 2024
Biztonsági szemle
Host takeovers likely with critical Judge0 flaws
SecurityWeek reports that online open-source service Judge0 used for arbitrary code execution within a sandbox has been impacted by three critical vulnerabilities, which could be leveraged to facilitate sandbox escapes, privilege escalation, and...
![Ransomware attack](/sites/default/files/styles/narrow_1x/public/feeds/84/0926_ransomware.jpg.webp?itok=hK1UAKBN)
1 May 2024
Biztonsági szemle
Philadelphia Inquirer breach impacts over 25K
The Philadelphia Inquirer has confirmed that 25,549 individuals had their personal and financial details exfiltrated following a cyberattack last May, according to BleepingComputer.
![The JPMorgan logo is displayed on a smartphone screen and in the background](/sites/default/files/styles/narrow_1x/public/feeds/95/0501_jpmorgan.jpg.webp?itok=H80g1YMQ)
1 May 2024
Biztonsági szemle
More than 450K hit by JPMorgan breach
Major U.S. multinational financial services firm JPMorgan had information from more than 450,000 of its customers compromised following a data breach in August 2021, reports Cybernews.
![Stickers, buttons and pencils with the WordPress logo are seen in a pile.](/sites/default/files/styles/narrow_1x/public/feeds/15/071522_wordpress.jpg.webp?itok=DP8ZSyJa)
1 May 2024
Biztonsági szemle
Novel Wpeeper Android malware examined
BleepingComputer reports that hacked WordPress sites have been used as relay command-and-control servers by the novel Wpeeper Android malware, which has been spread via a pair of app stores impersonating the Uptodown App Store and is believed to have...
![Microsoft Azure logo](/sites/default/files/styles/narrow_1x/public/feeds/7c/033123_microsoft_azure.jpg.webp?itok=jPM3nYyE)
1 May 2024
Biztonsági szemle
Microsoft Azure, Cloudflare lures leveraged to spread Latrodectus malware downloader
Threat actors have leveraged Microsoft Azure and Cloudflare lures to facilitate phishing campaigns deploying the Latrodectus malware downloader, also known as IceNova and Unidentified 111, BleepingComputer reports.
![The Docker website is displayed on a computer.](/sites/default/files/styles/narrow_1x/public/feeds/86/022423_docker_hub.jpg.webp?itok=6rf54yXa)
1 May 2024
Biztonsági szemle
Malicious repositories proliferate in Docker Hub
More than three million of 4.79 imageless repositories uploaded to Docker Hub over the past five years have been leveraged to target the container registry's users in three separate malicious campaigns, reports The Hacker News.
![ISC Knowledge Base](/sites/default/files/styles/narrow_1x/public/2023-10/ISC-logo-rgb-2048x1149.png.webp?itok=ICtukOrO)
1 May 2024
Biztonsági szemle
Kea Hook Libraries
Kea Hook Library Packages Kea Hooks are separate libraries that can be optionally installed with Kea to provide additional functionality. Some of the Kea hooks are licensed under the MPL 2.0 open source license, and are packaged with the open source...
1 May 2024
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-7028 GitLab Community and Enterprise Editions Improper Access Control Vulnerability These types of vulnerabilities...
1 May 2024
Biztonsági szemle
CERT/CC Reports R Programming Language Vulnerability
CERT Coordination Center (CERT/CC) has released information on a vulnerability in R programming language implementations ( CVE-2024-27322). A cyber threat actor could exploit this vulnerability to take control of an affected system. Users and...
1 May 2024
Biztonsági szemle
CISA and Partners Release Fact Sheet on Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity
Today, CISA, in collaboration with U.S. and international partners, published a joint fact sheet, Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity. This fact sheet provides information and mitigations associated with cyber...
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
1 May 2024
Biztonsági szemle
ISC Stormcast For Wednesday, May 1st, 2024 https://isc.sans.edu/podcastdetail/8962, (Wed, May 1st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Pagination
- Previous page ‹‹
- Page 185
- Next page ››