Security Bulletin

29 Aug 2024
Biztonsági szemle
2024 SC Awards Finalists: Best Threat Intelligence Technology
Cybercrime is big business, and techniques of bad actors are growing increasingly sophisticated. That leaves security teams thirsting for near realtime intelligence about the threat landscape.
29 Aug 2024
Biztonsági szemle
Delta Electronics DTN Soft
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.4 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: DTN Soft Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an...
29 Aug 2024
Biztonsági szemle
Rockwell Automation ThinManager ThinServer
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Rockwell Automation Equipment: ThinManager ThinServer Vulnerabilities: Improper Privilege Management, Incorrect Permission Assignment for...
29 Aug 2024
Biztonsági szemle
#StopRansomware: RansomHub Ransomware
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include...
29 Aug 2024
Biztonsági szemle
CISA Releases Three Industrial Control Systems Advisories
CISA released three Industrial Control Systems (ICS) advisories on August 29, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-242-01 Rockwell Automation...
29 Aug 2024
Biztonsági szemle
CISA and Partners Release Advisory on RansomHub Ransomware
Today, CISA—in partnership with the Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), and Department of Health and Human Services (HHS)—released a joint Cybersecurity Advisory, #StopRansomware...

29 Aug 2024
Biztonsági szemle
Don’t let a lack of visibility into legacy IT bring the company down
Sure, everyone focuses on CVEs, but not every company has the ability to have full visibility into legacy IT.

29 Aug 2024
Biztonsági szemle
Unifying Cyber Defenses: How Hybrid Mesh Firewalls Shape Modern Security
Hybrid mesh firewall platforms enable security policy enforcement between workloads and users across any network, especially in on prem-first organizations.

29 Aug 2024
Biztonsági szemle
Live Patching DLLs with Python, (Thu, Aug 29th)
In my previous diary[ 1], I explained why Python became popular for attackers. One of the given reason was that, from Python scripts, it's possible to call any Windows API and, therefore, perform low-level activities on the system. In another...

29 Aug 2024
Biztonsági szemle
ISC Stormcast For Thursday, August 29th, 2024 https://isc.sans.edu/podcastdetail/9118, (Thu, Aug 29th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

29 Aug 2024
Biztonsági szemle
South Korean APT Exploits 1-Click WPS Office Bug, Nabs Chinese Intel
The most popular office software suite in China actually has two critical vulnerabilities, which allowed hackers the opportunity for remote code execution. Time to patch.
Pagination
- Previous page ‹‹
- Page 546
- Next page ››