Security Bulletin
![SASE](/sites/default/files/styles/narrow_1x/public/feeds/4a/EtayMaorSEPCol-e1694199033926.jpg.webp?itok=M9cUN5st)
17 Apr 2024
Biztonsági szemle
Credential exposure possible with cloud CLI tool vulnerability
Organizations could have their sensitive information compromised through a high-severity vulnerability in Google Cloud, Azure, and Amazon Web Services command line interface tools dubbed "LeakyCLI", The Hacker News reports.
![close up on man hand type password on keyboard computer desktop to access VPN mode](/sites/default/files/styles/narrow_1x/public/feeds/7c/011624_vpn.jpg.webp?itok=TIHHq932)
17 Apr 2024
Biztonsági szemle
VPN, SSH services targeted by widespread brute-force attack campaign
Numerous VPN and SSH services, including Cisco Secure Firewall VPN, SonicWall VPN, Fortinet VPN, Check Point VPN, Miktrotik, Ubiquiti, and RD Web Services, have been subjected to a far-reaching brute-force attack campaign since March 18, reports...
![](/sites/default/files/styles/narrow_1x/public/feeds/3b/RSAC-2024-social-woman-linkedin-2.jpg.webp?itok=xadrIFe7)
17 Apr 2024
Biztonsági szemle
Supercharging Cisco XDR with AI and Identity Intelligence at RSAC 2024
Discover the new Cisco XDR capabilities that will give security teams even more insight, automation, and control over your environment at RSA Conference 2024.
![AI security risks](/sites/default/files/styles/narrow_1x/public/feeds/1b/041624_big_data_ai.jpg.webp?itok=GjgL-_Lc)
17 Apr 2024
Biztonsági szemle
How AI-powered IAM can bolster security
While integrating AI into IAM promises many benefits, here are six challenges and potential pitfalls teams must address to succeed.
![](/sites/default/files/styles/narrow_1x/public/feeds/95/gru_Militarist_shutterstock.jpg.webp?itok=2Z4M9k6A)
17 Apr 2024
Biztonsági szemle
'Sandworm' Group Is Russia's Primary Cyberattack Unit in Ukraine
But even with that focus, the sophisticated threat group has continued operations against targets globally, including the US, says Google's Mandiant.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
17 Apr 2024
Biztonsági szemle
Congratulations to the Top MSRC 2024 Q1 Security Researchers!
Congratulations to all the researchers recognized in this quarter’s Microsoft Researcher Recognition Program leaderboard! Thank you to everyone for your hard work and continued partnership to secure customers. The top three researchers of the 2024 Q1...
![](/sites/default/files/styles/narrow_1x/public/feeds/8d/israeli_binary_Birgit_Korber_Alamy.jpg.webp?itok=8KJoDveA)
17 Apr 2024
Biztonsági szemle
Israeli Defense Forces Hold Hybrid Cyber & Military Readiness Drills
Israel prepares for a response to Iran's April 14 drone and missile attack.
![](/sites/default/files/styles/narrow_1x/public/feeds/d6/isc-20240417-1.png.webp?itok=LOxnxAnP)
17 Apr 2024
Biztonsági szemle
Malicious PDF File Used As Delivery Mechanism, (Wed, Apr 17th)
Billions of PDF files are exchanged daily and many people trust them because they think the file is "read-only" and contains just "a bunch of data". In the past, badly crafted PDF files could trigger nasty vulnerabilities in PDF viewers. All of them...
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
17 Apr 2024
Biztonsági szemle
ISC Stormcast For Wednesday, April 17th, 2024 https://isc.sans.edu/podcastdetail/8942, (Wed, Apr 17th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/a6/bug_code_Phichak_Alamy.jpg.webp?itok=6mX7DqJz)
17 Apr 2024
Biztonsági szemle
Delinea Fixes Flaw, but Only After Analyst Goes Public With Disclosure First
Delinea rolls out Secret Server SOAP API flaw fixes, while researcher claims the vendor ignored his findings for weeks.
![](/sites/default/files/styles/narrow_1x/public/feeds/ab/quantumcomputer-DM-AdobeStock.jpeg.webp?itok=b6jha6w-)
17 Apr 2024
Biztonsági szemle
How Boards Can Prepare for Quantum Computers
Quantum computing on the level that poses a threat to current cybersecurity measures is still years off. Here's what enterprises can do now to avoid future disruptions.
Pagination
- Previous page ‹‹
- Page 222
- Next page ››