Security Bulletin
23 Sep 2024
Biztonsági szemle
Commerce Dept. Proposes Ban on Automotive Software & Hardware From China, Russia
After launching an investigation in February into vehicles made by foreign adversaries, the Biden administration is finally making its move in the name of national security.
23 Sep 2024
Biztonsági szemle
Why threat intelligence is essential to consolidated security
Integration and coordination of threat intelligence across all your security tools isn’t just one of the benefits of implementing a consolidated security platform — it’s one of the primary reasons to do so.
23 Sep 2024
Biztonsági szemle
Data Security Posture Management: Accelerating Time to Value
Data discovery and classification are foundational for data security, data governance, and data protection.
23 Sep 2024
Biztonsági szemle
Star Health data exposed via Telegram bots
Despite the shutdown of both chatbots — which provided free access to up to 20 data samples from 31.2 million datasets and PDF-based claim documents — more have emerged to distribute the stolen data.
23 Sep 2024
Biztonsági szemle
Crypto heist against BingX leads to theft of over $44M
Investigation conducted alongside blockchain security firm SlowMist noted the theft of nearly $44.7 million as a result of the incident although calculations are still ongoing, said BingX, which emphasized its immediate implementation of urgent asset...
23 Sep 2024
Biztonsági szemle
Dell hounded by second breach claim
Dell had its internal files claimed to be compromised by the threat actor "grep" just days after the same actor admitted to stealing 10,863 employee records from a breach earlier this month.
23 Sep 2024
Biztonsági szemle
MC2 Data leak exposes nearly a third of US population
The misconfiguration revealed more than 106 million records with U.S. citizens' private information and over 2.3 million MC2 Data subscribers' data.
23 Sep 2024
Biztonsági szemle
Significant hacktivist attacks launched against Russia
After obtaining initial access via local or domain account exploitation, Twelve proceeds to leverage Remote Desktop Protocol to facilitate further infrastructure penetration, as well as utilize other tools, including Cobalt Strike, Chisel, Mimikatz...
23 Sep 2024
Biztonsági szemle
Another Ivanti CSA vulnerability leveraged in ongoing attacks
Such a development comes less than a week after the confirmed exploitation of the high-severity operating system command injection bug in CSA, tracked as CVE-2024-8190, which was believed to have been used alongside another vulnerability due to its...
23 Sep 2024
Biztonsági szemle
New EAGLEDOOR backdoor spread in suspected Chinese APT attacks against Asia-Pacific
Aside from leveraging spear-phishing emails, Earth Baxia also exploited the recently addressed critical GeoServer GeoTools flaw, tracked as CVE-2024-36401.
23 Sep 2024
Biztonsági szemle
When it comes to solving the ongoing cybersecurity crisis in healthcare, don’t bet on Congress
Look for large state governments like New York to lead the way in addressing many of healthcare’s cybersecurity issues, not Congress.
23 Sep 2024
Biztonsági szemle
Phishing links with @ sign and the need for effective security awareness building, (Mon, Sep 23rd)
While going over a batch of phishing e-mails that were delivered to us here at the Internet Storm Center during the first half of September, I noticed one message which was somewhat unusual. Not because it was untypically sophisticated or because it...
Pagination
- Previous page ‹‹
- Page 628
- Next page ››