Security Bulletin
3 Oct 2024
Biztonsági szemle
14 DrayTek vulnerabilities patched, including max-severity RCE flaw
More than 267,000 internet-exposed routers are likely vulnerable to exploitation.
3 Oct 2024
Biztonsági szemle
Zimbra email platform under active attack, RCE possible
If properly executed, the exploit would allow an attacker to obtain remote code execution on the target server.
2 Oct 2024
Biztonsági szemle
North Korea's 'Stonefly' APT Swarms US Private Co's. for Profit
Despite a $10 million bounty on one member, APT45 is not slowing down, pivoting from intelligence gathering to extorting funds for Kim Jong-Un's regime.
2 Oct 2024
Biztonsági szemle
NSA Releases 6 Principles of OT Cybersecurity
Organizations can use this guide to make decisions about designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as to enable business continuity for critical services.
2 Oct 2024
Biztonsági szemle
Unix Printing Vulnerabilities Enable Easy DDoS Attacks
All an attacker needs to exploit flaws in the Common Unix Printing System is a few seconds and less than 1 cent in computing costs.
2 Oct 2024
Biztonsági szemle
Security related Docker containers, (Wed, Oct 2nd)
Over the last 9 months or so, I've been putting together some docker containers that I find useful in my day-to-day malware analysis and forensicating. I have been putting them up on hub.docker.com and decided, I might as well let others...
2 Oct 2024
Biztonsági szemle
North Korean's Stonefly shifts from espionage to ransomware, extortion
While it not has been successful on its first wave of attacks, security pros warn that Stonefly intends to extort U.S. companies via ransomware.
2 Oct 2024
Biztonsági szemle
Python-Based Malware Slithers Into Systems via Legit VS Code
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines.
2 Oct 2024
Biztonsági szemle
US indicts UK hacker behind insider trading scheme
Confidential trading data exfiltrated from the U.S. companies' systems had been leveraged by Westbrook to amass $3.75 million in illicit profits from trades before over a dozen earnings announcements.
2 Oct 2024
Biztonsági szemle
Funding round raises $7M for DefectDojo
Aside from touting its platform's consolidated command center that enables automated vulnerability triage and risk acceptance across various stages, DefectDojo has also introduced visualization upgrades.
2 Oct 2024
Biztonsági szemle
Proposed independent cyber service assessment, JFHQ-DODIN upgrade rejected by Defense Department
Independent evaluation for the cyber force is no longer necessary as Congress had already required such assessments as part of the fiscal 2023 NDAA, noted the Defense Department in its plea.
2 Oct 2024
Biztonsági szemle
Federal threat sharing system revival promised by CISA
Inadequate CISA outreach for data producer recruitment and retention has primarily led to overall AIS participation decreasing from 304 to 135 between the calendar years 2020 and 2022.
Pagination
- Previous page ‹‹
- Page 567
- Next page ››