Security Bulletin

14 Oct 2024
Biztonsági szemle
The Lingering 'Beige Desktop' Paradox
Organizations are grappling with the risks of having outdated hardware handling core workloads, mission-critical applications no one knows how to update or maintain, and systems that IT and security teams don't know about.

14 Oct 2024
Biztonsági szemle
Microsoft: Schools Grapple With Thousands of Cyberattacks Weekly
Education, including K-12 schools and universities, has become the third most targeted sector due to the high variety of sensitive data it stores in its databases.

14 Oct 2024
Biztonsági szemle
Vulnerable instances of Log4j still being used nearly 3 years later
Critical vulnerabilities take over 500 days to be fixed.

14 Oct 2024
Biztonsági szemle
Command-jacking used to launch malicious code on open-source platforms
Attackers hijack legitimate commands and run malicious code to launch supply chain attacks.

14 Oct 2024
Biztonsági szemle
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.

14 Oct 2024
Biztonsági szemle
Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day.

14 Oct 2024
Biztonsági szemle
Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you do business.

14 Oct 2024
Biztonsági szemle
Increased cyberinsurance claim sizes fueled by ransomware
Almost 75% of all reported cyberinsurance claims during the first half of this year were attributed to business email compromise attacks, ransomware incidents, and fund transfer fraud, with average ransomware claim losses totaling $353,000.

14 Oct 2024
Biztonsági szemle
Final CMMC rule issued by Defense Department
Included in the finalized CMMC 2.0 rule are required third-party or Defense Industrial Base Cybersecurity Assessment Center compliance evaluations of contractors dealing with sensitive data although contractors with less sensitive information would...

14 Oct 2024
Biztonsági szemle
Cyberattack prompts National Public Data bankruptcy filing
Such a development comes months after National Public Data admitted the exposure of a database stolen from a December 2023 breach beginning in April, which was then followed by civil penalties being sought by over 20 states as well as potential fines...

14 Oct 2024
Biztonsági szemle
Fake crypto token leveraged by FBI in crypto fraud crackdown
Fraudulent crypto token trades have allegedly been conducted by the indicted firms and individuals to lure more investors, according to the Justice Department, which noted the sequestration of over $25 million worth of cryptocurrency and several wash...

14 Oct 2024
Biztonsági szemle
Ransomware attack compromises Casio data
Investigation into the incident revealed the exfiltration of personal data from Casio and its affiliates' permanent and temporary employees, business partners, customers, and interviewed prospects for employment, as well as contracts with business...
Pagination
- Previous page ‹‹
- Page 431
- Next page ››