Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
11 Jul 2024
Biztonsági szemle
Understanding SSH Honeypot Logs: Attackers Fingerprinting Honeypots, (Thu, Jul 11th)
Some of the commands observed can be confusing for a novice looking at ssh honeypot logs. Sure, you have some obvious commands like "uname -a" to fingerprint the kernel. However, other commands are less intuitive and are not commands a normal user...
![](/sites/default/files/styles/narrow_1x/public/feeds/5f/fishphish-Juniors-Bildarchiv-GmbH-Alamy.jpg.webp?itok=7P1CYiKh)
11 Jul 2024
Biztonsági szemle
FishXProxy Phishing Kit Outfits Cybercriminals for Success
A new end-to-end toolkit circulating on the Dark Web significantly lowers the barrier to entry for creating sophisticated campaigns that can avoid most traditional security detection and protection systems.
![](/sites/default/files/styles/narrow_1x/public/feeds/95/NicoElNino-digital-lock-shutterstock.jpg.webp?itok=CS5h0ey2)
11 Jul 2024
Biztonsági szemle
Microsoft Melds Identity & SSE With Entra Suite
The integration of Entra Identity offerings with new security service edge (SSE) services to provide unified conditional access is seeking enterprise approval.
![](/sites/default/files/styles/narrow_1x/public/feeds/58/Image-13_Hybrid-Work_GCC_Brief-2_GettyImages-1927268114-1200x800-5b2df79.jpg.webp?itok=wCnc2QdI)
11 Jul 2024
Biztonsági szemle
How to Optimize Remote Work
Choosing the right remote work systems for your SMB is easy. We have a large list of customizable solutions that can keep your teams connected and secure.
![](/sites/default/files/styles/narrow_1x/public/feeds/ec/Crystal_rain-Nick_Hanna-Alamy.jpg.webp?itok=MHEkfbdF)
11 Jul 2024
Biztonsági szemle
'Crystalray' Attacks Jump 10X, Using Only OSS to Steal Credentials
Remember when hackers used to write their own malware? Kids these days don't want to work, they just want freely available tools to do it for them.
![](/sites/default/files/styles/narrow_1x/public/feeds/f0/Cybersecurity%281800%29_Tero_Vesalainen_Alamy.jpg.webp?itok=owXhl2Yx)
11 Jul 2024
Biztonsági szemle
Centralized Cyber-Incident Reporting Can Improve Effectiveness
Companies need robust cyber-response plans and a straightforward path to transparency.
![SMS 2FA](/sites/default/files/styles/narrow_1x/public/feeds/55/ReedCol-e1691442848226.jpg.webp?itok=nDwNiZKR)
11 Jul 2024
Biztonsági szemle
Mandatory MFA option unveiled by Snowflake
While the new policy could be adopted based on Snowflake customers' preferences, OAuth and other key-pair authentication systems are still recommended for service users.
![Microsoft logo on the website homepage.](/sites/default/files/styles/narrow_1x/public/feeds/b0/061324_microsoft.jpg.webp?itok=jjSGxOuG)
11 Jul 2024
Biztonsági szemle
Microsoft chided for spam-looking APT29 hack notifications
Organizations affected by the breach have been urged by security researcher and former Microsoft employee Kevin Beaumont to be vigilant of the emails, which were not sent in adherence to the Microsoft 365 breach process.
![binary code and magnifying glass](/sites/default/files/styles/narrow_1x/public/feeds/df/032724_software_bug.jpg.webp?itok=H3BolHTb)
11 Jul 2024
Biztonsági szemle
Unauthorized content alteration bug found in NSA platform
Attackers could exploit the flaw, which stemmed from inadequate CSRF protections primarily in SkillTree endpoints for state-changing operations, to spread misinformation and prompt training disruptions.
![](/sites/default/files/styles/narrow_1x/public/feeds/48/GettyImages-1238219471-1.jpg.webp?itok=jIQWo8Tn)
11 Jul 2024
Biztonsági szemle
Severe vulnerabilities addressed by GitLab, others
GitLab has issued a fix for the critical flaw in GitLab Community Edition and Enterprise Edition software, tracked as CVE-2024-6385, which could be leveraged for arbitrary pipeline job execution.
![Cyber law, digital justice scales](/sites/default/files/styles/narrow_1x/public/feeds/93/0526_justice_scales.jpg.webp?itok=JkexVfOE)
11 Jul 2024
Biztonsági szemle
Nearly 39M legal records leaked by misconfigured database
Further investigation of the leaked 38 TB dataset revealed links to another storage repository with 89,475 records belonging to backend technology provider Legal Connect, which shares the same parent firm as Rapid Legal.
![](/sites/default/files/styles/narrow_1x/public/feeds/87/061224_malware.jpg.webp?itok=8wy12WIo)
11 Jul 2024
Biztonsági szemle
ViperSoftX infostealer evolves with improved obfuscation
Fraudulent JPG files have also been leveraged by ViperSoftX to deploy AutoIT scripts and the AutoIT executable, along with PowerShell scripts.
Pagination
- Previous page ‹‹
- Page 34
- Next page ››