Security Bulletin

4 Sep 2024
Biztonsági szemle
YubiKey 5 devices open to cloning via side-channel attacks
Security pros say while side-channel attacks are difficult to pull off, the sheer volume of YubiKey devices in use makes the potential threat a real concern.

4 Sep 2024
Biztonsági szemle
Open Source Tool Allows Voters to Verify Election Results
The ElectionGuard project allows anyone — voters, campaign staffers, and election officials — to cryptographically verify ballots, a promise that may bolster faith in election integrity.

4 Sep 2024
Biztonsági szemle
FBI: North Korean Actors Readying Aggressive Cyberattack Wave
Sophisticated social engineering is expected to accompany threat campaigns that are highly targeted and aimed at stealing crypto and deploying malware.

4 Sep 2024
Biztonsági szemle
Three myths preventing you from building your lifecycle practice
Unlock 3X more recurring revenue by building a lifecycle practice with Cisco. Overcome common myths with help from Cisco distributors, enhancing customer experience and boosting profitability with streamlined support and expertise.

4 Sep 2024
Biztonsági szemle
Scans for Moodle Learning Platform Following Recent Update, (Wed, Sep 4th)
On August 10th, the popular learning platform "Moodle" released an update fixing %%cve:2024-43425%%. RedTeam Pentesting found the vulnerability and published a detailed blog post late last week. The...

4 Sep 2024
Biztonsági szemle
Nozomi unveils threat intelligence solutions developed with Mandiant
Aside from announcing the general availability of the Nozomi TI Expansion Pack Nozomi also unveiled new Vantage Threat Cards, which would enable improved data analysis from threat intelligence feeds through the Nozomi Vantage console.

4 Sep 2024
Biztonsági szemle
Novel ManticoraLoader MaaS examined
Aside from facilitating the comprehensive gathering and exfiltration of device information ManticoraLoader, which could be rented for $500 a month, also features extensive obfuscation capabilities enabling evasion of the 360 Total Security sandboxing...

4 Sep 2024
Biztonsági szemle
Cyberattacks against critical infrastructure escalate
U.S. critical infrastructure entities were most targeted by the intrusions, with the UK, Germany, India, and Japan completing the five most hit countries, while a majority of the attacks were launched from China, Russia, and Iran, an analysis from...

4 Sep 2024
Biztonsági szemle
Israeli spies targeted by Iranian hackers
Malicious posts on X, formerly Twitter, and its Iranian counterpart Virsaty have been leveraged by threat actors pretending to be Israeli human resource employees and headhunters to lure individuals experienced in cybersecurity and IT into providing...

4 Sep 2024
Biztonsági szemle
Air Force intelligence, cyber offices’ separation imminent
Such a separation — which would restore intelligence, surveillance, and reconnaissance responsibilities to A2 alone while bringing in a three-star general to lead the new A6 command by next spring — aims to bolster Air Forces Cyber as sought by Air...

4 Sep 2024
Biztonsági szemle
How CISOs Can Effectively Communicate Cyber-Risk
A proximity resilience graph offers a more accurate representation of risk than heat maps and risk registers, and allows CISOs to tell a complex story in a single visualization.

4 Sep 2024
Biztonsági szemle
Over $33M fine imposed on Clearview AI for facial recognition database
Clearview AI committed significant violations of the European Union’s General Data Protection Regulation after establishing the database without properly notifying individuals whose images were included, said the DPA, which could impose an additional...
Pagination
- Previous page ‹‹
- Page 535
- Next page ››