Security Bulletin

8 Jan 2025
Biztonsági szemle
New Docuseries Spotlights Hackers Who Shaped Cybersecurity
"Where Warlocks Stay Up Late" project speaks to hackers who have played pivotal roles in shaping the field of cybersecurity. The video interviews are complemented by an encyclopedia and an anthropological map.

8 Jan 2025
Biztonsági szemle
Unconventional Cyberattacks Aim to Take Over PayPal Accounts
Attackers are abusing a Microsoft 365 feature to send payment requests to users, tricking them into logging in to their accounts so attackers can seize control over them.

8 Jan 2025
Biztonsági szemle
SMB Digital Transformation: Enabling Success by Fostering a Culture of Innovation and Agility
Explore how Rasheeda Frazier of Empowering Greatness Inc. drives digital transformation for SMBs, fostering innovation and agility, and empowering communities through strategic insights and Cisco partnerships.

8 Jan 2025
Biztonsági szemle
Context matters: Why observability is fundamental to identity protection
It’s clear that stationary views of identity security are no longer helpful.

8 Jan 2025
Biztonsági szemle
ESET urges migration from Windows 10 ahead of support deadline
In a recent blog post, ESET highlighted the heightened security risks tied to the termination of updates for Windows 10 scheduled for October 2025 and noted that cybercriminals are likely to exploit vulnerabilities once support ends.

8 Jan 2025
Biztonsági szemle
Major Russian Internet outage attributed to telecom network issues
The outage mainly affected users in Moscow, who experienced interruptions to mobile, cable internet, and television services.

8 Jan 2025
Biztonsági szemle
Tenable urges manual upgrades to Nessus agent amid outages
The issue impacted Nessus Agent versions 10.8.0 and 10.8.1 and rendered agents offline in regions including the Americas, Europe, and Asia. Tenable halted plugin updates to contain the problem and later released version 10.8.2 to address the shutdown...

8 Jan 2025
Biztonsági szemle
Taiwan faces escalating cyberattacks linked to China
The attacks, which targeted key sectors such as telecommunications, transportation, and defense, have disrupted vital government services and heightened concerns about Taiwan’s digital vulnerabilities.

8 Jan 2025
Biztonsági szemle
Treasury Secretary calls out China’s malicious cyber activities
In a virtual meeting with China’s Vice Premier He Lifeng, U.S. Treasury Secretary Janet Yellen expressed serious concern regarding alleged malicious cyber activities perpetrated by actors sponsored by the People’s Republic of China.

8 Jan 2025
Biztonsági szemle
Phylum tech purchased by Veracode
Integrating Phylum's technology would enable Veracode's Software Composition Analysis platform to accelerate identification and response to malicious packages in open-source libraries while providing customers with improved visibility on open-source...

8 Jan 2025
Biztonsági szemle
Telegram user data sharing with law enforcement ramps up
Such figures represent a significant increase in government requests fulfilled by Telegram, which had only provided 108 users' information in response to 14 requests until September, when the messaging platform updated its privacy policy in aid of...

8 Jan 2025
Biztonsági szemle
Best Practices & Risks Considerations in LCNC and RPA Automation
Low-code/no-code (LCNC) and robotic process automation (RPA) technologies allow companies to speed up development processes and reduce costs, but security is often overlooked. When this happens, the risks can outweigh the benefits.
Pagination
- Previous page ‹‹
- Page 306
- Next page ››