Security Bulletin

25 Sep 2024
Biztonsági szemle
DNS Reflection Update and Odd Corrupted DNS Requests, (Wed, Sep 25th)
Occasionally, I tend to check in on what reflective DNS denial of service attacks are doing. We usually see steady levels of attacks. Usually, they attempt to use spoofed requests for ANY records to achieve the highest possible amplification...

25 Sep 2024
Biztonsági szemle
Safe and trustworthy AI is a shared responsibility
In an era where artificial intelligence (AI) is rapidly transforming industry and society, collaboration between the public and private sectors has never been more critical. Trust and safety are ultimately on the line. Learn more from Dev Stahlkopf...

25 Sep 2024
Biztonsági szemle
Rev up to Recert: Power up Your Programming Skills
*Rev Up to Recert: Programming* is now available, September 25 to November 22, 2024, giving tech learners free access to 20+ hours of tech learning, labbing, and programming—eligible for up to 24 Cisco Continuing Education (CE) credits towards...

25 Sep 2024
Biztonsági szemle
Empowered Together: A Story of Hope and Partnership
Read more about Kevin Donaghy's battle with cancer that led to 'Stories of Cancer and Hope,' a book uniting the community to support cancer patients through shared stories and raising funds for cancer charities.

25 Sep 2024
Biztonsági szemle
More robust defense-in-depth security sought by new Bitdefender service
Aside from utilizing advanced machine learning models enabling application usage, data access rights, and security permissions management, GravityZone PHASR also leverages its endpoint security and risk analytics integration to identify organizations...

25 Sep 2024
Biztonsági szemle
It's a bright future at InfoSec World 2024
Relentless optimism, especially around AI, was the order of the day as the InfoSec World 2024 conference kicked off in Orlando.

25 Sep 2024
Biztonsági szemle
Inadvertent North Korean IT worker hiring prevalent among Fortune 100 firms
U.S.-based laptop farms have been leveraged by North Korea to ensure the employment of North Korean IT workers, who are mostly located in China or Russia, with the devices connected to various remote management tools.

25 Sep 2024
Biztonsági szemle
Concealed Fox Kitten infrastructure exposed
Aside from leveraging dynamic IP addresses, Fox Kitten also sought to conceal its attack infrastructure through broad Autonomous System deployment and spurious certificate names.

25 Sep 2024
Biztonsági szemle
Unmanaged IBM AIX server enabled Chinese compromise of US aerospace firm
Attackers' infiltration of the IBM AIX server incompatible with the firm's current security tools in March facilitated malicious activity for the next four months.

25 Sep 2024
Biztonsági szemle
Ukraine subjected to more targeted Russian cyberattacks
Russian cyberattacks against Ukraine originated from eight different threat clusters, some of which were associated with the country's national guard RosGvardia.

25 Sep 2024
Biztonsági szemle
US May Be Losing the Race for Global AI Leadership
To maintain AI leadership, Congress and regulatory agencies must recognize that our foreign competitors are working to surpass us.

25 Sep 2024
Biztonsági szemle
Post-Quran burning cyberattack against Sweden attributed to Iran
Such an attack was noted by Swedish officials to have been conducted to falsely portray the country's Islamophobia and increase polarization among its citizens.
Pagination
- Previous page ‹‹
- Page 478
- Next page ››