Security Bulletin

9 Oct 2024
Biztonsági szemle
Easterly dismisses possibility of election result-altering cyberattack
Such confidence in the resilience of the U.S.'s election infrastructure against destructive cyberattacks stems from the significant improvements that have been implemented by state and local election officials on ensuring voting and ballot counting...

9 Oct 2024
Biztonsági szemle
Automated CUPS vulnerability scanner unveiled
After establishing an HTTP server on the scanning machine to observe incoming HTTP requests from network devices, the automated scanner proceeds to deliver a custom UDP packet to every IP address in range instructing request delivery from CUPS...

9 Oct 2024
Biztonsági szemle
Dallas Cowboys Innovate with Webex and Cisco
The Dallas Cowboys have enhanced their customer experience and internal collaboration by leveraging Cisco's Webex solutions.

9 Oct 2024
Biztonsági szemle
Building Cyber Resilience in SMBs With Limited Resources
With careful planning, ongoing evaluation, and a commitment to treat cybersecurity as a core business function, SMBs can transform their vulnerabilities into strengths.

9 Oct 2024
Biztonsági szemle
What do we want? More sandboxes! When do we want them? Now!
It is my pleasure to announce the general availability of several new DevNet sandboxes. We’re continuously monitoring sandbox utilization and listening to our community so that we can continuously improve the user experience we are providing with our...

9 Oct 2024
Biztonsági szemle
Microsoft: Creative Abuse of Cloud Files Bolsters BEC Attacks
Since April, attackers have increased their use of Dropbox, OneDrive, and SharePoint to steal the credentials of business users and conduct further malicious activity.

9 Oct 2024
Biztonsági szemle
Building an AI-Native Security Operations Center: Revolutionizing Your Cyber Defense
The most recent blog from Kunal Hatode focuses on building an AI-native security operations center. Come dive into the details and join the conversation.

9 Oct 2024
Biztonsági szemle
The Countdown Has Begun: Getting Started on Your Post-Quantum Journey
Using existing encryption and key management technologies, enterprises can realize quantum-safe encryption today without waiting for implementations.
9 Oct 2024
Biztonsági szemle
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-23113 Fortinet Multiple Products Format String Vulnerability CVE-2024-9379 Ivanti Cloud Services Appliance...

9 Oct 2024
Biztonsági szemle
From Perfctl to InfoStealer, (Wed, Oct 9th)
A few days ago, a new stealthy malware targeting Linux hosts made a lot of noise: perfctl[ 1]. The malware has been pretty well analyzed and I won't repeat what has been already disclosed. I found a copy of the "httpd" binary (SHA256...

9 Oct 2024
Biztonsági szemle
ISC Stormcast For Wednesday, October 9th, 2024 https://isc.sans.edu/podcastdetail/9172, (Wed, Oct 9th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

9 Oct 2024
Biztonsági szemle
Despite Prevalence of Online Threats, Users Aren't Changing Behavior
Consumers are victims of online scams and have their data stolen, but they are lagging on adopting security tools to protect themselves.
Pagination
- Previous page ‹‹
- Page 444
- Next page ››