Security Bulletin

16 Aug 2024
Biztonsági szemle
Why Are Organizations Losing the Ransomware Battle?
Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving threats.

16 Aug 2024
Biztonsági szemle
Securing the developer pipeline: The evolving role of the CISO in today’s threat landscape
Paul Davis, Field CISO at Jfrog, delves into the critical challenges facing today’s information security leaders, particularly in securing development workflows.

16 Aug 2024
Biztonsági szemle
US probe on TP-Link sought amid Chinese cyberattack concerns
Conducting a federal probe on TP-Link was noted by the lawmakers to be crucial following reports that known TP-Link firmware and instance vulnerabilities were leveraged by threat actors to compromise European government officials.

16 Aug 2024
Biztonsági szemle
Critical vulnerabilities in open-source tools for AI identified
Attackers could have leveraged the issue in the Setuptools Python package — which is used to facilitate Python library management and installation in AI models — to enable arbitrary code execution via specially crafted package URLs.

16 Aug 2024
Biztonsági szemle
Industrial firms face ransomware spike in second quarter
Most attacks continued to be aimed at U.S. and European industrial firms, particularly those involved in manufacturing, according to a Dragos report.

16 Aug 2024
Biztonsági szemle
Ransomware attack proceeds, crypto theft rise in first half
Ransomware attack earnings rose by $10 million to more than $459 million during the first half of this year, with proceeds poised to reach a record high by year-end amid the increasing prevalence of ransomware intrusions this year.

16 Aug 2024
Biztonsági szemle
Kentucky county's clerk's office breached in RansomHub attack
Included in the 47 GB data exfiltrated from the county clerk's office's systems were financial documents, customer contracts, alarm system information, budget details, ballot information, and voter records as early as 2008, claimed RansomHub.

16 Aug 2024
Biztonsági szemle
Updated Gafgyt botnet exploits GPU for cryptomining
Malicious payloads delivered following the brute-force attacks enabled XMRig deployment via "systemd-net" and the termination of other malware, as well as the execution of the Id-musl-x86 SSH scanner to facilitate malware spread.

16 Aug 2024
Biztonsági szemle
China subjected to new ValleyRAT malware attack campaign
Attacks commence with the delivery of fraudulent business- or finance-related documents, which when executed open the default app for Word documents while establishing a mutex and altering registry entries to ensure persistence.

16 Aug 2024
Biztonsági szemle
Newly emergent Mad Liberator ransomware gang detailed
Approval of an AnyDesk connection authorization request sent by Mad Liberator to one organization prompted the execution of a Windows update screen-emulating binary to obtain device control and access to a linked OneDrive account.

16 Aug 2024
Biztonsági szemle
Five ways to secure modern, AI-based customer support tools
Here’s how to modernize and service customers better, but keep the enterprise secure.

16 Aug 2024
Biztonsági szemle
Sajtószemle – 2024. 33. hét
A 2024. 33. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.08.09. és 2024.08.15. között kezelt incidensek statisztikai adatait is tartalmazza.
Pagination
- Previous page ‹‹
- Page 572
- Next page ››