Security Bulletin
24 Apr 2025
Biztonsági szemle
Navigating Regulatory Shifts & AI Risks
By proactively embracing emerging trends around encryption, AI security, and platform consolidation, organizations can turn compliance burdens into competitive advantage.
24 Apr 2025
Biztonsági szemle
Over 260K compromised in Kelly Benefits breach
Kelly Benefits, a Maryland-based benefits administration and payroll solutions provider, has confirmed that almost 264,000 individuals served by its customers Amergis, CareFirst, Beam Benefits, Intercon Truck of Baltimore, Beltway Companies, The...
24 Apr 2025
Biztonsági szemle
From ransomware recovery to endpoint security innovation: The ThreatLocker story
Danny Jenkins founded ThreatLocker to revolutionize endpoint security by implementing comprehensive zero-trust controls and blocking software by default, challenging the traditional cybersecurity approach.
24 Apr 2025
Biztonsági szemle
Why comprehensive scan coverage is critical for DevSecOps lifecycle success and regulatory compliance
Picking over code doesn’t guarantee problem-free software. Only automated scans that analyze first- and third-party code can provide the total visibility required to comply with the CRA and other new digital-security regulations.
24 Apr 2025
Biztonsági szemle
Black Hat Asia 2025: Innovation in the SOC
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
24 Apr 2025
Biztonsági szemle
Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: iSTAR Configuration Utility (ICU) Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful...
24 Apr 2025
Biztonsági szemle
Planet Technology Network Products
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Planet Technology Equipment: Planet Technology Network Products Vulnerabilities: Improper Neutralization of Special Elements used in an OS...
24 Apr 2025
Biztonsági szemle
ALBEDO Telecom Net.Time - PTP/NTP Clock
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: ALBEDO Telecom Equipment: Net.Time - PTP/NTP clock Vulnerability: Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of...
24 Apr 2025
Biztonsági szemle
Nice Linear eMerge E3
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Nice Equipment: Linear eMerge E3 Vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 2...
24 Apr 2025
Biztonsági szemle
Schneider Electric Modicon Controllers
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum Vulnerabilities: Trust Boundary Violation...
24 Apr 2025
Biztonsági szemle
Vestel AC Charger
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Vestel Equipment: AC Charger Vulnerability: Exposure of Sensitive System Information to an Unauthorized Control Sphere 2. RISK EVALUATION...
24 Apr 2025
Biztonsági szemle
CISA Releases Seven Industrial Control Systems Advisories
CISA released seven Industrial Control Systems (ICS) advisories on April 24, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-114-01 Schneider Electric Modicon...
Pagination
- Previous page ‹‹
- Page 248
- Next page ››