Security Bulletin
30 Jan 2025
Biztonsági szemle
Contec Health CMS8000 Patient Monitor
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Contec Health Equipment: CMS8000 Patient Monitor Vulnerabilities: Out-of-bounds Write, Hidden Functionality (Backdoor), Privacy Leakage 2. RISK...
30 Jan 2025
Biztonsági szemle
Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Harmony Industrial PC, Pro-face Industrial PC Vulnerability: Exposure of Sensitive Information to an Unauthorized...

30 Jan 2025
Biztonsági szemle
Fake Videos of Former First Lady Scam Namibians
Amateurish financial scams are common across Africa, and Namibia's influential former first lady, Monica Geingos, has emerged as a particularly effective host body for these messages.

30 Jan 2025
Biztonsági szemle
ISC Stormcast For Thursday, January 30th, 2025 https://isc.sans.edu/podcastdetail/9302, (Thu, Jan 30th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

30 Jan 2025
Biztonsági szemle
UK agency floats plan to overhaul vulnerability classifications
The UK’s cybersecurity regulator has pitched a plan that would see the elimination of vulnerability ratings.

30 Jan 2025
Biztonsági szemle
Lynx ransomware infiltration reveals affiliate panel details
Group-IB researchers uncovered a structured affiliate workflow and “all-in-one” RaaS with multiple encryption modes.

29 Jan 2025
Biztonsági szemle
Minutes are miles: Why automatic rollbacks are too slow to protect you
When it comes to cyber threats, protection is better than response.

29 Jan 2025
Biztonsági szemle
PrintNightmare Aftermath: Windows Print Spooler Is Better. What's Next?
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.

29 Jan 2025
Biztonsági szemle
The CISO Role Elevates, Boosts, Rises, and Evolves - BSW #380

29 Jan 2025
Biztonsági szemle
Researchers Uncover Lazarus Group Admin Layer for C2 Servers
The threat actor is using a sophisticated network of VPNs and proxies to centrally manage command-and-control servers from Pyongyang.

29 Jan 2025
Biztonsági szemle
Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers
VulnCheck initially disclosed the critical command-injection vulnerability (CVE-2024-40891) six months ago, but Zyxel has yet to mention its existence or offer users a patch to mitigate threats.

29 Jan 2025
Biztonsági szemle
Mirai Variant 'Aquabot' Exploits Mitel Device Flaws
Yet another spinoff of the infamous DDoS botnet is exploiting a known vulnerability in active attacks, while its threat actors are promoting it on Telegram for other attackers to use as well, in a DDoS-as-a-service model.
Pagination
- Previous page ‹‹
- Page 280
- Next page ››