Security Bulletin
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12822″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/98/CSP_170_Ken_Townsend_-_1920x1080_d4ff1be8-fc2b-4528-86a3-76d5dba01f41.jpg.webp?itok=E_6av2H0)
16 Apr 2024
Biztonsági szemle
The Importance of OT Security: The Evolving Threat Landscape - Ken Townsend - CSP #170
![internet security and data protection concept](/sites/default/files/styles/narrow_1x/public/feeds/a1/1017_cybersecurity.jpg.webp?itok=SOjpwWQ-)
16 Apr 2024
Biztonsági szemle
New online data privacy legislation examined
Mounting concerns regarding the operations of major data brokers in the U.S. have prompted House Energy and Commerce Committee Chair Cathy McMorris Rodger, R-Wash., and Senate Commerce, Science and Transportation Committee Chair Maria Cantwell, D...
![patch presented in the form of binary code](/sites/default/files/styles/narrow_1x/public/feeds/b3/030524_patch.jpg.webp?itok=o1JGGMLW)
16 Apr 2024
Biztonsági szemle
Over 100 Juniper Networks flaws addressed
SecurityWeek reports that more than 100 security vulnerabilities affecting several Juniper Networks products have been patched as part of dozens of advisories issued by the firm last week.
![A computer screen with Javascript is seen](/sites/default/files/styles/narrow_1x/public/feeds/35/011824_javascript.jpg.webp?itok=CC9kWIrE)
16 Apr 2024
Biztonsági szemle
Attempted XZ Utils backdoor-like hijacking thwarted
Attempted hijacking attacks similar to the recent compromise of the XZ Utils data compression project have been averted by OpenJS Foundation researchers, according to The Record, a news site by cybersecurity firm Recorded Future.
![Abstract Red Background with Binary Code Numbers. Data Breach, Malware, Cyber Attack, Hacking](/sites/default/files/styles/narrow_1x/public/feeds/c8/040423_malware.jpg.webp?itok=--SDNIB_)
16 Apr 2024
Biztonsági szemle
Russian infrastructure disrupted by Ukrainian hackers
Operations of Russia's industrial sensor and monitoring infrastructure were claimed to have been disrupted by Ukrainian hacking operation Blackjack following a Fuxnet malware attack against Moscow-based underground infrastructure firm Moscollector...
![An aerial photo of the US Capitol in Washington.](/sites/default/files/styles/narrow_1x/public/feeds/25/041624_us_capitol.jpg.webp?itok=5pq0FLRe)
16 Apr 2024
Biztonsági szemle
Attack against Space-Eyes claimed by IntelBroker
Hackread reports that Miami-based geospatial intelligence company Space-Eyes was claimed to have been compromised by IntelBroker, which purportedly resulted in the exfiltration of the firm's sensitive data, including confidential U.S. national...
![cloud_AdobeStock_355036138](/sites/default/files/styles/narrow_1x/public/feeds/e4/AdobeStock_355036138.jpg.webp?itok=Ikbdb0RV)
16 Apr 2024
Biztonsági szemle
New Muddled Libra attacks set sights on cloud
Attacks by the Muddled Libra threat operation — also known as UNC3944, Scattered Spider, Scatter Swine, and Starfraud — have been redirected at cloud service providers and software-as-a-service apps as part of efforts to bolster its data extortion...
![Warning icon on a digital LCD display with reflection.](/sites/default/files/styles/narrow_1x/public/feeds/64/1004_malware.jpg.webp?itok=tbMRUSIJ)
16 Apr 2024
Biztonsági szemle
Steganography leveraged in new global TA558 attack campaign
More than 320 organizations in various sectors around the world, most of which are in Latin America, have been subjected to the new SteganoAmor attack campaign by the TA558 hacking operation that involved the use of steganography to enable the...
![](/sites/default/files/styles/narrow_1x/public/feeds/75/Screenshot-2024-04-12-at-10.35.38%E2%80%AFAM.png.webp?itok=1cp0p2dF)
16 Apr 2024
Biztonsági szemle
Synergizing Advanced Identity Threat Detection & Response Solutions
Explore the synergy of Cisco's Duo Security & Identity Intelligence, bolstering cyber defense with advanced threat detection & response capabilities
16 Apr 2024
Biztonsági szemle
RoboDK RoboDK
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 3.3 ATTENTION: Low attack complexity Vendor: RoboDK Equipment: RoboDK Vulnerability: Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could result in an attacker...
16 Apr 2024
Biztonsági szemle
Measuresoft ScadaPro
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.8 ATTENTION: Low attack complexity Vendor: Measuresoft Equipment: ScadaPro Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to...
16 Apr 2024
Biztonsági szemle
Rockwell Automation ControlLogix and GuardLogix
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, 1756-EN4TR Vulnerability: Improper Input Validation 2. RISK...
Pagination
- Previous page ‹‹
- Page 224
- Next page ››