Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/3f/Security-XDR-Image.jpeg.webp?itok=3bW8-F08)
10 Jul 2024
Biztonsági szemle
The Trifecta Effect of Integrating XDR, SIEM, and SOAR
Stay ahead of sophisticated cybersecurity threats with the trifecta effect of integrating XDR, SIEM, and SOAR. Learn how integrating these technologies can enhance your organization's security.
![](/sites/default/files/styles/narrow_1x/public/feeds/98/NSA-DOD_Photo-Alamy.jpg.webp?itok=1ehsRB-G)
10 Jul 2024
Biztonsági szemle
What's Bugging the NSA? A Vuln in Its 'SkillTree' Training Platform
Even the NSA leaves bugs in its software. In this case, it's the kind of cross-site issue that regularly slips past developers.
![spyware](/sites/default/files/styles/narrow_1x/public/feeds/96/1009_spyware.jpg.webp?itok=UaqJqH8z)
10 Jul 2024
Biztonsági szemle
Middle East orgs subjected to pro-Houthi cyberattacks
Attacks with the GuardZoo surveillance tool have been launched by a pro-Houthi threat operation to exfiltrate documents and photos from Middle Eastern militaries since 2019.
![data breach](/sites/default/files/styles/narrow_1x/public/feeds/ed/data-breach.jpg.webp?itok=xzS8OED6)
10 Jul 2024
Biztonsági szemle
Heritage Foundation data exposed by SiegedSec hackers
Included in the leak were information from Heritage's blogs and right-wing media site The Daily Signal, such as full names, usernames, passwords, and email addresses, as well as those belonging to the U.S. government.
![Network of platforms with bots on top botnet cybersecurity conce](/sites/default/files/styles/narrow_1x/public/feeds/2e/0919_botnet_attacks.jpg.webp?itok=LhDJfUBs)
10 Jul 2024
Biztonsági szemle
Russian AI-based disinformation campaign dismantled
The U.S. has spearheaded a global law enforcement operation dismantling nearly 1,000 accounts on X, formerly Twitter, and a pair of domains part of an artificial intelligence-powered bot farm.
![](/sites/default/files/styles/narrow_1x/public/feeds/81/2024-07-10_figure1.PNG.webp?itok=90Kb2nTN)
10 Jul 2024
Biztonsági szemle
Finding Honeypot Data Clusters Using DBSCAN: Part 1, (Wed, Jul 10th)
Sometimes data needs to be transformed or different tools need to be used so that it can be compared with other data. Some honeypot data is easy to compare since there is no customized information such as randomly generated file names, IP addresses...
![Account takeovers](/sites/default/files/styles/narrow_1x/public/feeds/6b/050724_malware.jpg.webp?itok=wvjBy_oq)
10 Jul 2024
Biztonsági szemle
Time to see past the blind spots of account takeover
Here are three ways security teams can mitigate ATOs
![](/sites/default/files/styles/narrow_1x/public/feeds/ea/Passkey%281800%29_ArtemisDiana_Alamy.jpg.webp?itok=EaYVeqxz)
10 Jul 2024
Biztonsági szemle
Google Targets Passkey Support to High-Risk Execs, Civil Society
The tech giant has rolled out passkey support for account authentication within its Advanced Protection Program to complement existing compatibility with FIDO2 hardware keys.
![](/sites/default/files/styles/narrow_1x/public/feeds/a8/camel-Cucu_Rosa-Alamy.jpg.webp?itok=3omlXX_O)
10 Jul 2024
Biztonsági szemle
Houthi-Aligned APT Targets Mideast Militaries With 'GuardZoo' Spyware
Simple malware and simple TTPs play against a backdrop of complex geopolitical conflict in the Arab world.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
10 Jul 2024
Biztonsági szemle
ISC Stormcast For Wednesday, July 10th, 2024 https://isc.sans.edu/podcastdetail/9046, (Wed, Jul 10th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/c3/siphons-Design_Pics_Inc-alamy.jpg.webp?itok=KkkGR-4-)
10 Jul 2024
Biztonsági szemle
5 Tips to Minimize the Costly Effects of Data Exfiltration
The more sensitive data an organization collects, the more at risk it is to a cyberattack. Here's how to limit the damage.
![](/sites/default/files/styles/narrow_1x/public/feeds/ad/Kanpan-cyber-investigations-shutterstock.jpg.webp?itok=_jFrDmMb)
10 Jul 2024
Biztonsági szemle
Cloud-Based Investigations Platform Targets Complexity in Incident Response
Software-as-a-service company Command Zero launches with a platform for investigating cybersecurity incidents that aims to minimize the grunt work.
Pagination
- Previous page ‹‹
- Page 38
- Next page ››