Security Bulletin

1 Nov 2024
Biztonsági szemle
Active exploitation of PTZOptics zero-days underway
Attacks exploiting the authentication weakness within the 'lighthttpd' server, tracked as CVE-2024-8957, and the insufficient input sanitization bug, tracked as CVE-2024-8957, could enable camera hijacking and bot compromise, as well as further...

1 Nov 2024
Biztonsági szemle
Supply chain attack compromises LottieFiles npm package with crypto drainer
Such an intrusion has prompted automated delivery of the malicious lottie-player NPM package versions among users who obtained the library through third-party content delivery networks.

1 Nov 2024
Biztonsági szemle
New attack techniques utilized by Iranian cyber group Emennet Pasargad
Iranian cyber operation Emennet Pasargad was noted by the FBI, Department of Treasury, and the Israel National Cyber Directorate to have leveraged updated tradecraft, such as IP camera breaches and generative artificial intelligence, in recent...

1 Nov 2024
Biztonsági szemle
Novel Xiū gǒu phishing kit has global reach
Attacks involved the use of Rich Communication Services messages indicating false payments that included links redirecting to websites spoofing government agencies, postal services, and banking entities, including the U.S. Postal Service, Linkt, and...

1 Nov 2024
Biztonsági szemle
Quad7 botnet-compromised credentials tapped by various Chinese hackers
After Quad7's successful exfiltration of targeted systems' passwords through a limited number of sign-in attempts meant to evade detection, Storm-0940 immediately utilized the stolen credentials to breach networks, conduct credential dumping, and...

1 Nov 2024
Biztonsági szemle
The Overlooked Importance of Identifying Riskiest Users
"See one, teach one, do one" takes a page out of the healthcare playbook to reduce human vulnerabilities where they matter most in cybersecurity.

31 Oct 2024
Biztonsági szemle
Beyond firewalls: The role of managed services in comprehensive security
Here's how managed security services, including MDRs and MSSPs, provide proactive protection such as vulnerability management and attack surface management.

31 Oct 2024
Biztonsági szemle
Facebook Businesses Targeted in Infostealer Phishing Campaign
The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.

31 Oct 2024
Biztonsági szemle
Cybersecurity Job Market Stagnates, Dissatisfaction Abounds
The 2024 ISC2 Cybersecurity Workforce Study found that amid a tightening job market and dynamic cyber-threat environment, ongoing staffing and skills shortages are putting organizations at serious risk. Can AI move the needle in defenders' favor?

31 Oct 2024
Biztonsági szemle
Essential Open-Source Security Tools: From Vulnerability Scanning to AI Safety
Following Cybersecurity Awareness Month aims, we want to share information about open-source projects that can help enhance the security of your apps and organization and improve LLM security. Nuclei… Read more on Cisco Blogs

31 Oct 2024
Biztonsági szemle
EmeraldWhale steals 15,000 credentials from exposed Git configurations
In a twist, more than 1 terabyte of data was stored in the S3 bucket of a previous victim.
Pagination
- Previous page ‹‹
- Page 393
- Next page ››