Security Bulletin
27 Jun 2024
Biztonsági szemle
Vanna AI prompt injection vulnerability enables RCE
A process for generating charts is susceptible to code injection through specially crafted prompts.
27 Jun 2024
Biztonsági szemle
Beazley Security Launches With MXDR Offering
The combined skills from Beazley's cybersecurity services team and Lodestone will go into the company's new managed extended detection and response (MXDR) service.
27 Jun 2024
Biztonsági szemle
An Artificially Intelligent Peer Reviewer Arrives
How should network engineers be thinking about and using AI right now, and what to could they expect for the future? Here, we focus on one surprising use case that I found to be a bit exciting: Using AI to peer review your work. Buckle up, and let's...
27 Jun 2024
Biztonsági szemle
Insult to injury: scammers found preying on fraud victims
Scammers are increasingly looking to target users who recently fell victim to fraud.
27 Jun 2024
Biztonsági szemle
Dark Reading Confidential: Meet the Ransomware Negotiators
Episode 2: Incident response experts-turned-ransomware negotiators Ed Dubrovsky, COO and managing partner of CYPFER, and Joe Tarraf, chief delivery officer of Surefire Cyber, explain how they interact with cyber threat actors who hold victim...
27 Jun 2024
Biztonsági szemle
MOVEit Transfer Flaws Push Security Defense Into a Race With Attackers
While Progress has released patches for the vulnerabilities, attackers are trying to exploit them before organizations have a chance to remediate.
27 Jun 2024
Biztonsági szemle
Your Phone's 5G Connection Is Vulnerable to Bypass, DoS Attacks
Wireless service providers prioritize uptime and lag time, occasionally at the cost of security, allowing attackers to take advantage, steal data, and worse.
27 Jun 2024
Biztonsági szemle
Smart Infrastructure Gets Lit Up!
In the era of 5G, cellular and neutral host providers are expanding their radio networks to provide better coverage and data performance in densely populated areas. Municipalities and utilities operating streetlights are making their structures...
27 Jun 2024
Biztonsági szemle
China-Sponsored Attackers Target 40K Corporate Users in 90 Days
The attacks infiltrate enterprise networks through browsers, and show an evolution in evasive and adaptive tactics from well-resourced state-sponsored actors.
27 Jun 2024
Biztonsági szemle
CISA Releases Guidance on Network Access, VPNs
CISA outlines how modern cybersecurity relies on network visibility to defend against threats and scams.
27 Jun 2024
Biztonsági szemle
Achieve Next-Level Security Awareness by Creating Secure Social Norms
By committing to build secure habits at work and in our personal lives, and to helping others do the same, our personal information will be much better protected.
27 Jun 2024
Biztonsági szemle
AI to further fuel accelerated synthetic identity fraud growth
The report noted that synthetic identity fraud could be combated by public sector organizations through the implementation of omnichannel verification, or the corroboration of identities through multiple approaches.
Pagination
- Previous page ‹‹
- Page 61
- Next page ››