Security Bulletin

1 Oct 2024
Biztonsági szemle
Cybersecurity experts praise veto of California's AI safety bill
Despite its good intentions, many experts said the bill took a flawed approach to regulating AI safety.

30 Sep 2024
Biztonsági szemle
Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players
Critics viewed the bill as seeking protections against nonrealistic "doomsday" fears, but most stakeholders agree that oversight is needed in the GenAI space.

30 Sep 2024
Biztonsági szemle
Researchers hacked Kia cars armed with only license plate numbers
A team of security researchers discovered a vulnerability that allows for Kia cars to be remotely compromised with nothing more than a license plate number.

30 Sep 2024
Biztonsági szemle
Overtaxed State CISOs Struggle With Budgeting, Staffing
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle, but not necessarily enough money or people to handle it sufficiently well.

30 Sep 2024
Biztonsági szemle
DoJ Charges 3 Iranian Hackers in Political 'Hack & Leak' Campaign
The cyberattackers allegedly stole information from US campaign officials only to turn around and weaponize it against unfavored candidates.

30 Sep 2024
Biztonsági szemle
FERC Outlines Supply Chain Security Rules for Power Plants
The US Federal Energy Regulatory Commission spells out what electric utilities should do to protect their software supply chains, as well as their network "trust zones."

30 Sep 2024
Biztonsági szemle
Reachability Analysis Pares Down Static Security-Testing Overload
For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues.

30 Sep 2024
Biztonsági szemle
Louisiana accounting firm breach affects 127,000 customers
Midsize accounting firm takes nearly a year to notify customers of a breach.

30 Sep 2024
Biztonsági szemle
Tool update: mac-robber.py and le-hex-to-ip.py, (Mon, Sep 30th)
One of the problems I've had since I originally wrote mac-robber.py [ 1][ 2][ 3] seven years ago is that because of the underlying os.stat python library we couldn't get file creation times (B-times). Since the release of GNU...

30 Sep 2024
Biztonsági szemle
Sloppy Entra ID Credentials Attract Hybrid Cloud Ransomware
Microsoft warns that ransomware group Storm-0501 has shifted from buying initial access to leveraging weak credentials to gain on-premises access before moving laterally to the cloud.

30 Sep 2024
Biztonsági szemle
5 Reasons Why Developers Should Attend Security Conferences
On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and...
Pagination
- Previous page ‹‹
- Page 469
- Next page ››