Security Bulletin
1 Nov 2024
Biztonsági szemle
Developer Velocity & Security: Can You Get Out of the Way in Time?
When a CISO can articulate risk in context to the business as a whole, development teams can better prioritize their activities.
1 Nov 2024
Biztonsági szemle
Microsoft Recall launch postponed anew
Such postponement comes after Recall was subjected to several delays since June due to security concerns associated with the feature, which has since been allayed by Microsoft with its assurances of an opt-in experience, a completely encrypted...
1 Nov 2024
Biztonsági szemle
About 87K compromised in Mystic Valley Elder Services breach
Infiltration of systems belonging to Mystic Valley, which caters to older adults and people with disabilities, have enabled the exfiltration of names, birthdates, Social Security numbers, payment card and financial account numbers, passport numbers...
1 Nov 2024
Biztonsági szemle
Tougher export controls for US tech sought
The U.S. Commerce Department has been urged by Sen. Ron Wyden, D-Ore., to bolster the already robust proposed U.S. tech rules that would prevent the utilization of the country's surveillance tools in repressive countries amid concerns of potential...
1 Nov 2024
Biztonsági szemle
Serious WordPress compromise likely with LiteSpeed Cache plugin bug
Such a vulnerability, which arises from an insufficient security hash check vulnerable to brute-forcing, could be successfully abused with the activation of certain configurations within the plugin's crawler feature.
1 Nov 2024
Biztonsági szemle
Active exploitation of PTZOptics zero-days underway
Attacks exploiting the authentication weakness within the 'lighthttpd' server, tracked as CVE-2024-8957, and the insufficient input sanitization bug, tracked as CVE-2024-8957, could enable camera hijacking and bot compromise, as well as further...
1 Nov 2024
Biztonsági szemle
Supply chain attack compromises LottieFiles npm package with crypto drainer
Such an intrusion has prompted automated delivery of the malicious lottie-player NPM package versions among users who obtained the library through third-party content delivery networks.
1 Nov 2024
Biztonsági szemle
New attack techniques utilized by Iranian cyber group Emennet Pasargad
Iranian cyber operation Emennet Pasargad was noted by the FBI, Department of Treasury, and the Israel National Cyber Directorate to have leveraged updated tradecraft, such as IP camera breaches and generative artificial intelligence, in recent...
1 Nov 2024
Biztonsági szemle
Novel Xiū gǒu phishing kit has global reach
Attacks involved the use of Rich Communication Services messages indicating false payments that included links redirecting to websites spoofing government agencies, postal services, and banking entities, including the U.S. Postal Service, Linkt, and...
1 Nov 2024
Biztonsági szemle
Quad7 botnet-compromised credentials tapped by various Chinese hackers
After Quad7's successful exfiltration of targeted systems' passwords through a limited number of sign-in attempts meant to evade detection, Storm-0940 immediately utilized the stolen credentials to breach networks, conduct credential dumping, and...
1 Nov 2024
Biztonsági szemle
The Overlooked Importance of Identifying Riskiest Users
"See one, teach one, do one" takes a page out of the healthcare playbook to reduce human vulnerabilities where they matter most in cybersecurity.
Pagination
- Previous page ‹‹
- Page 45
- Next page ››