Security Bulletin
![Cybersecurity personnel work in a cyber operations center](/sites/default/files/styles/narrow_1x/public/feeds/18/080422_cyber_operations_center.jpg.webp?itok=PMZTs3px)
17 Apr 2024
Biztonsági szemle
Marine Corps’ overseas cyber force mission seeks stronger critical infrastructure defenses
Marine Corps Forces Cyberspace Command experts have been deployed to Okinawa, Japan, as part of continuous defensive cyberspace operations-internal defense measures aimed at strengthening the Indo-Pacific Command region's cybersecurity defenses...
![Business man & business woman doing tug of war](/sites/default/files/styles/narrow_1x/public/feeds/0e/GettyImages-115049939.jpg.webp?itok=1qhdWCXT)
17 Apr 2024
Biztonsági szemle
Identity security and user experience: Where balance can be achieved
How do cybersecurity professionals make access convenient without leading to a compromise?
![Hand holding sim card, select focus, color effect](/sites/default/files/styles/narrow_1x/public/feeds/cd/041724_sim_card.jpg.webp?itok=j-XFhgAr)
17 Apr 2024
Biztonsági szemle
Scammers offer cash to phone carrier staff to swap SIM cards
T-Mobile and Verizon workers report receiving text messages offering them up to $300 for each illegal SIM swap they complete.
![](/sites/default/files/styles/narrow_1x/public/feeds/96/Botnet_Stuart_Miles_Alamy.jpg.webp?itok=uRdLrpeB)
17 Apr 2024
Biztonsági szemle
Various Botnets Pummel Year-Old TP-Link Flaw in IoT Attacks
Moobot, Miori, AGoent, and a Gafgyt variant have joined the infamous Mirai botnet in attacking unpatched versions of vulnerable Wi-Fi routers.
![](/sites/default/files/styles/narrow_1x/public/feeds/07/Warfare_Aleksei_Gorodenkov_Alamy.jpg.webp?itok=bk_dInFo)
17 Apr 2024
Biztonsági szemle
Preparing for Cyber Warfare: 6 Key Lessons From Ukraine
Having a solid disaster recovery plan is the glue that keeps your essential functions together when all hell breaks loose.
![American cash banknotes money](/sites/default/files/styles/narrow_1x/public/feeds/81/030323_cash_money.jpg.webp?itok=d_CNwBEV)
17 Apr 2024
Biztonsági szemle
Total ransomware payment ban requires more prep
CyberScoop reports that achieving stronger cybersecurity resilience across critical infrastructure organizations and small- and medium-sized businesses was noted by former Acting National Cyber Director Kemba Walden to be crucial before implementing...
![The EU's DMA](/sites/default/files/styles/narrow_1x/public/feeds/53/040424_app_store.jpg.webp?itok=GxMevb6K)
17 Apr 2024
Biztonsági szemle
Significant privacy violations net over $7M fine for Cerebral
Mental health subscription platform Cerebral has been ordered by the Federal Trade Commission to pay more than $7 million to resolve charges alleging that it provided TIkTok, LinkedIn, Snapchat, and other third-party entities access to sensitive data...
![DDoS attack](/sites/default/files/styles/narrow_1x/public/feeds/bd/1030_ddos.jpg.webp?itok=SE0gk_M1)
17 Apr 2024
Biztonsági szemle
DDoS attacks spike in first quarter
Fifty percent more distributed denial-of-service attacks have been launched by threat actors during the first quarter of 2024 over the same period last year, with thwarted DDoS attacks increasing by 93% year-over-year, SiliconAngle reports.
![Six cloud security tips](/sites/default/files/styles/narrow_1x/public/feeds/49/041124_cloud_security.jpg.webp?itok=Nvk1JVJl)
17 Apr 2024
Biztonsági szemle
Over 4B Discord messages purportedly harvested by data scraper
Major instant messaging and VoIP social platform Discord had over four billion messages from almost 620 million users stored across over 14,000 chat servers claimed to be gathered by internet data scraping site Spy.pet, The Register reports.
![Abstract Malware Ransomware virus encrypted files with key on binary bit background.](/sites/default/files/styles/narrow_1x/public/feeds/f8/1020_ransomware.jpg.webp?itok=RIRIVhLL)
17 Apr 2024
Biztonsági szemle
Cyberattack disclosed by East Coast fisheries org following 8Base ransomware claims
Atlantic States Marine Fisheries Commission, an East Coast fisheries management organization, has disclosed having its systems disrupted by a cyberattack after the 8Base ransomware operation took responsibility for the incident, according to The...
![](/sites/default/files/styles/narrow_1x/public/feeds/66/cloud-security-padlock-Rasi-Bhadramani-Alamy.jpg.webp?itok=FCrfrjG5)
17 Apr 2024
Biztonsági szemle
Why a Native-First Approach Is Key to Cloud Security
A native-first approach delivers better protections and a more efficient use of resources than best-of-breed solutions, benefiting cloud service providers and end-user customers alike.
![SASE](/sites/default/files/styles/narrow_1x/public/feeds/4a/EtayMaorSEPCol-e1694199033926.jpg.webp?itok=M9cUN5st)
17 Apr 2024
Biztonsági szemle
Credential exposure possible with cloud CLI tool vulnerability
Organizations could have their sensitive information compromised through a high-severity vulnerability in Google Cloud, Azure, and Amazon Web Services command line interface tools dubbed "LeakyCLI", The Hacker News reports.
Pagination
- Previous page ‹‹
- Page 221
- Next page ››