Security Bulletin

17 Dec 2024
Biztonsági szemle
EPA, CISA warn water facilities to disconnect HMIs from internet
Attackers can use tools like Shodan to hone-in on which water facilities are vulnerable, then take control of a facility.

17 Dec 2024
Biztonsági szemle
From digital risk to physical threat: Why cybersecurity must evolve for executives
Cybersecurity’s role in safeguarding executive leaders—both in the digital and physical realms—has never been more vital.

17 Dec 2024
Biztonsági szemle
Texas Tech Fumbles Medical Data in Massive Breach
The cyberattack impacts at least 1.4 million patients, as tranches of highly sensitive personal, medical, and financial data fall into the hands of cyber crooks who have everything they need to carry out convincing social engineering and fraud...

17 Dec 2024
Biztonsági szemle
CISA Directs Federal Agencies to Secure Cloud Environments
Actions direct agencies to deploy specific security configurations to reduce cyber-risk.

17 Dec 2024
Biztonsági szemle
Massive DeceptionAds campaign examined
Attacks involved the addition of a BeMob URL to the ad management system of the Monetag website monetization platform, also known as Omnatuor or Vane Viper, in an effort to enable TDS redirection to fake CAPTCHA pages hosted on various legitimate...

17 Dec 2024
Biztonsági szemle
Ongoing malware attack campaign sets sights on YouTubers
More than 300 SMTP servers have been leveraged by yet-to-be-identified threat actors to facilitate the automated distribution of phishing emails purporting to be business proposals, contracts, or promotional materials from widely known brands...

17 Dec 2024
Biztonsági szemle
Vulnerable webcams, DVRs subjected to HiatusRAT intrusions
Threat actors commenced scanning vulnerable online webcams and DVRs in the U.S., Canada, Australia, New Zealand, and the UK impacted by the CVE-2017-7921, CVE-2018-9995, CVE-2020-25078, CVE-2021-33044, and CVE-2021-36260 flaws, as well as default...

17 Dec 2024
Biztonsági szemle
Over 300 orgs compromised through several DrayTek exploits
Intrusions were initially conducted by the Monstrous Mantis operation, which exfiltrated DrayTek device credentials later shared with its partners Ruthless Mantis, also known as PTI-288, and LARVA-15, also known as Wazawaka, according to an analysis...

17 Dec 2024
Biztonsági szemle
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, Aaran Leyland, and More - SWN #438

17 Dec 2024
Biztonsági szemle
Azure Data Factory Bugs Expose Cloud Infrastructure
Three vulnerabilities in the service's Apache Airflow integration could have allowed attackers to take shadow administrative control over an enterprise cloud infrastructure, gain access to and exfiltrate data, and deploy malware.

17 Dec 2024
Biztonsági szemle
Data Centers Delivering AI Outcomes: Act and Start Now
Cisco’s new Wi-Fi 7 solution delivers unmatched connectivity, robust security, and AI-native assurance—setting a new standard for the modern workplace.
Pagination
- Previous page ‹‹
- Page 327
- Next page ››