Security Bulletin
![Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen](/sites/default/files/styles/narrow_1x/public/feeds/8d/1226_data_leak.jpg.webp?itok=AZJHDqy3)
22 Apr 2024
Biztonsági szemle
LockBit-leaked DC city agency data from third party
Washington, D.C.'s Department of Insurance, Securities and Banking has disclosed that 800GB of data claimed to have been stolen by the LockBit ransomware operation was obtained from an attack against third-party software provider Tyler Technologies...
![](/sites/default/files/styles/narrow_1x/public/feeds/90/Hacker_LightField_Studios_Inc_Alamy.jpg.webp?itok=jonuT6cr)
22 Apr 2024
Biztonsági szemle
Where Hackers Find Your Weak Spots
The five intelligence sources that power social engineering scams.
![2d illustration ransomware computer virus](/sites/default/files/styles/narrow_1x/public/feeds/ca/1120_ransomware.jpg.webp?itok=Gsqa9wXC)
22 Apr 2024
Biztonsági szemle
Red Ransomware takes credit for Targus attack
Cybernews reports that global mobile accessories manufacturer Targus was claimed to have been compromised early this month by the newly emergent Red Ransomware operation.
![A computer screen with Javascript is seen](/sites/default/files/styles/narrow_1x/public/feeds/35/011824_javascript.jpg.webp?itok=CC9kWIrE)
22 Apr 2024
Biztonsági szemle
More sophisticated, stealthy RedLine Stealer variant emerges
Information-stealing trojan RedLine Stealer has gained a more advanced variant leveraging the Lua bytecode and spoofing game cheats to facilitate increased stealth, The Hacker News reports.
![Malware attack virus alert. Person use laptop with virtual warning sign with ransomware word. warning notification, Cyber threats.](/sites/default/files/styles/narrow_1x/public/feeds/66/012324_ransomware.jpg.webp?itok=oHUcda34)
22 Apr 2024
Biztonsági szemle
Massive data leak conducted by HelloKitty ransomware amid rebrand
Ransomware operation HelloKitty has coincided its rebranding to HelloGookie with the publication of internal Cisco network data exfiltrated from a 2022 attack, exfiltrated source code for several CD Projekt Red games from a 2021 attack, and four...
![Abstract Red Background with Binary Code Numbers. Data Breach, Malware, Cyber Attack, Hacking](/sites/default/files/styles/narrow_1x/public/feeds/c8/040423_malware.jpg.webp?itok=--SDNIB_)
22 Apr 2024
Biztonsági szemle
New tool used in China-linked attacks against Asia-Pacific
Intrusions with the Waterbear backdoor and its updated variant dubbed "Deuterbear" have been deployed by China-linked threat operation BlackTech — also known as Earth Hundun, Manga Taurus, Circuit Panda, Temp.Overboard, Palmerwom, Red Djinn, and...
![Cloud technology and Data storage concept, Concept of Exchange information and data with internet cloud technology. FTP(File Transfer Protocol) files receiver.](/sites/default/files/styles/narrow_1x/public/feeds/c8/041024_file_transfer.jpg.webp?itok=Nps6mYF3)
22 Apr 2024
Biztonsági szemle
Intrusions exploiting critical CrushFTP zero-day underway
Vulnerable CrushFTP file transfer server software instances impacted by a critical virtual file system escape zero-day have been subjected to ongoing targeted attacks that could enable the download of system files, Security Affairs reports.
![<p>(Credit: Rafael Henrique – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/8e/AdobeStock_493255938_Editorial_Use_Only.jpg.webp?itok=9xr8sCnY)
22 Apr 2024
Biztonsági szemle
Active Palo Alto vulnerability exploitation puts over 22K firewalls at risk
BleepingComputer reports that ongoing attacks exploiting the critical Palo Alto Networks PAN-OS command injection flaw, tracked as CVE-2024-3400, could still compromise nearly 22,500 Palo Alto GlobalProtect firewall instances around the world despite...
![](/sites/default/files/styles/narrow_1x/public/feeds/86/Gartner-NaaS-Technical-Debt.jpg.webp?itok=huIShvrt)
22 Apr 2024
Biztonsági szemle
Transforming Operations to Eliminate Technical Debt
Discover the four steps to transforming your agency's technical debt to speed modernization and enhance mission innovation.
![UnitedHealthcare's Change Healthcare](/sites/default/files/styles/narrow_1x/public/feeds/25/041924_united_healthcare.jpg.webp?itok=tToC5xJW)
22 Apr 2024
Biztonsági szemle
Will the Change Healthcare case finally make providers do a business impact analysis?
The industry has talked about BIAs for years – and most providers still lean on cyber insurance in the wake of attack. That has to change.
![](/sites/default/files/styles/narrow_1x/public/feeds/7e/24-04-22-ics-overall.png.webp?itok=iLUWSlGX)
22 Apr 2024
Biztonsági szemle
It appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years, (Mon, Apr 22nd)
It has been nearly three years since we last looked at the number of industrial devices (or, rather, devices that communicate with common OT protocols, such as Modbus/TCP, BACnet, etc.) that are accessible from the internet[ 1]. Back in May of 2021...
Pagination
- Previous page ‹‹
- Page 209
- Next page ››