Security Bulletin

5 Feb 2025
Biztonsági szemle
Extensive software supply chain compromise possible with deserted AWS S3 buckets
Nearly 150 S3 buckets previously leveraged by cybersecurity firms, governments, Fortune 500 companies, and open source projects could be re-registered with the same AWS account name to facilitate executable and/or code injections in the deployment...

5 Feb 2025
Biztonsági szemle
More sophisticated ValleyRAT malware version emerges
This campaign primarily targets finance, accounting, and sales professionals, aiming to steal sensitive data.

5 Feb 2025
Biztonsági szemle
Novel SSH backdoor leveraged in Chinese cyberespionage attacks
Initial network appliance compromise and operation under root privileges will be verified before the deployment of the "libssdh.so" SSH library for data exfiltration and command-and-control communications and the "mainpasteheader" and...

5 Feb 2025
Biztonsági szemle
Counting Down to Cisco Live Amsterdam
Join the conversation with Adele Trombetta and see why she's excited about what Customer Experience has in store for Cisco Live EMEA this year in Amsterdam.

5 Feb 2025
Biztonsági szemle
7 cloud security startups not named Wiz
Wiz has dominated the cloud startup market for several years, but there are lesser-known startups that offer some very targeted cloud security products.
5 Feb 2025
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-53104 Linux Kernel Out-of-Bounds Write Vulnerability These types of vulnerabilities are frequent attack vectors...

5 Feb 2025
Biztonsági szemle
Enforcement of the Digital Operational Resilience Act (DORA) - Madelein van der Hout - BSW #381

5 Feb 2025
Biztonsági szemle
Nigeria Touts Cyber Success, Even as Cybercrime Rises in Africa
Organizations continue to be at high risk from cybercrime in Africa, despite law enforcement takedowns of cybercriminal syndicates in Nigeria and other African nations.

5 Feb 2025
Biztonsági szemle
ISC Stormcast For Wednesday, February 5th, 2025 https://isc.sans.edu/podcastdetail/9310, (Wed, Feb 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

5 Feb 2025
Biztonsági szemle
Microsoft fixes CVSS 9.9 vulnerability in Azure AI Face service
The flaw enabled authentication bypass by spoofing, with a proof-of-concept exploit available.

5 Feb 2025
Biztonsági szemle
How Are Modern Fraud Groups Using GenAI and Deepfakes?
Fraud groups are using cutting-edge technology to scale their operations to create fake identities and execute fraud campaigns.

4 Feb 2025
Biztonsági szemle
Backline Tackles Enterprise Security Backlogs With AI
The security startup's autonomous security remediation platform uses off-the-shelf large language models (LLMs) to analyze security alerts and apply the fixes.
Pagination
- Previous page ‹‹
- Page 269
- Next page ››