Security Bulletin

27 Jun 2024
Biztonsági szemle
Dark Reading Confidential: Meet the Ransomware Negotiators
Episode 2: Incident response experts-turned-ransomware negotiators Ed Dubrovsky, COO and managing partner of CYPFER, and Joe Tarraf, chief delivery officer of Surefire Cyber, explain how they interact with cyber threat actors who hold victim...

27 Jun 2024
Biztonsági szemle
MOVEit Transfer Flaws Push Security Defense Into a Race With Attackers
While Progress has released patches for the vulnerabilities, attackers are trying to exploit them before organizations have a chance to remediate.

27 Jun 2024
Biztonsági szemle
Your Phone's 5G Connection Is Vulnerable to Bypass, DoS Attacks
Wireless service providers prioritize uptime and lag time, occasionally at the cost of security, allowing attackers to take advantage, steal data, and worse.

27 Jun 2024
Biztonsági szemle
Smart Infrastructure Gets Lit Up!
In the era of 5G, cellular and neutral host providers are expanding their radio networks to provide better coverage and data performance in densely populated areas. Municipalities and utilities operating streetlights are making their structures...

27 Jun 2024
Biztonsági szemle
China-Sponsored Attackers Target 40K Corporate Users in 90 Days
The attacks infiltrate enterprise networks through browsers, and show an evolution in evasive and adaptive tactics from well-resourced state-sponsored actors.

27 Jun 2024
Biztonsági szemle
CISA Releases Guidance on Network Access, VPNs
CISA outlines how modern cybersecurity relies on network visibility to defend against threats and scams.

27 Jun 2024
Biztonsági szemle
Achieve Next-Level Security Awareness by Creating Secure Social Norms
By committing to build secure habits at work and in our personal lives, and to helping others do the same, our personal information will be much better protected.

27 Jun 2024
Biztonsági szemle
AI to further fuel accelerated synthetic identity fraud growth
The report noted that synthetic identity fraud could be combated by public sector organizations through the implementation of omnichannel verification, or the corroboration of identities through multiple approaches.

27 Jun 2024
Biztonsági szemle
BECs reported to be most common form of cyberattack
One-quarter of attacks during the first three months of 2024 involved BEC, most of which were in the finance sector, a report from Arctic Wolf revealed.

27 Jun 2024
Biztonsági szemle
Memory safe code adoption lagging in critical open-source projects
Fifty-two percent of 172 widely deployed critical open-source projects had memory-unsafe code or were not written in programming languages that curb memory-related errors.

27 Jun 2024
Biztonsági szemle
US indicts, puts bounty on alleged WhisperGate hacker
Russian Amin Timovich Stigal has been indicted by the U.S. Justice Department for his alleged involvement in the WhisperGate wiper malware attack against Ukrainian critical infrastructure systems.

27 Jun 2024
Biztonsági szemle
Novel credit card skimmer used in widespread attacks
Intrusions involved alterations of the WordPress plugin WooCommerce's checkout PHP file to enable staging of an HTML style sheet-emulating PHP script, which then allows retrieval of the credit card skimmer.
Pagination
- Previous page ‹‹
- Page 679
- Next page ››