Security Bulletin

3 Jun 2024
Biztonsági szemle
Snowflake refutes link to Ticketmaster, Santander breaches
U.S. cloud storage firm Snowflake has repudiated a now-removed Hudson Rock report linking the service provider to the attacks against Ticketmaster and Santander Bank, which the ShinyHunters threat operation claimed to have resulted in the collective...

3 Jun 2024
Biztonsági szemle
Malicious payloads spread via fraudulent browser updates
Threat actors have been leveraging phony web browser updates to facilitate the distribution of remote access trojans and information-stealing malware, according to The Hacker News.

3 Jun 2024
Biztonsági szemle
CISA's Secure by Design Initiative at 1: A Report Card
There is more that needs to be done, but, so far, the initiative is a success.

3 Jun 2024
Biztonsági szemle
Apache Log4j threat persists in global finance sector
Organizations in the financial industry around the world were warned by cyber threat intelligence expert Anis Haboubi regarding the persistent risk of attacks exploiting the years-old Apache Log4j2 vulnerability, tracked as CVE-2021-44832, as...

3 Jun 2024
Biztonsági szemle
More info on Emotet leader sought by international operation
International law enforcement agencies behind Operation Endgame, which has been touted to be the biggest anti-botnet and dropper malware operation, have called for more information regarding the leader of the Emotet botnet operation dubbed "Odd," who...

3 Jun 2024
Biztonsági szemle
Funding a Whole of State Approach for your Community
As you consider how to leverage SLCGP grants for a whole of state approach, here are five things Cisco account managers and partners should be aware of.

3 Jun 2024
Biztonsági szemle
XDR means so much more than some may realize
Discover how Cisco XDR redefines security with integrated tools, AI-driven threat detection, and rapid response to solve real-world problems for the SOC
3 Jun 2024
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2017-3506 Oracle WebLogic Server OS Command Injection Vulnerability These types of vulnerabilities are frequent attack...

3 Jun 2024
Biztonsági szemle
A Wireshark Lua Dissector for Fixed Field Length Protocols, (Mon, Jun 3rd)
I developed a Wireshark dissector in Lua to parse binary protocols (over TCP) that are composed of fields with fixed lengths. I got this idea while taking a SANS ICS training: for protocol reversing, it would be useful to have a dissector where I can...

3 Jun 2024
Biztonsági szemle
Three ways to deliver API security
Here are three ways to build APIs that deliver the functionality and security modern organizations need.

3 Jun 2024
Biztonsági szemle
Improved Guidance for Azure Network Service Tags
Summary Microsoft Security Response Center (MSRC) was notified in January 2024 by our industry partner, Tenable Inc., about the potential for cross-tenant access to web resources using the service tags feature. Microsoft acknowledged that Tenable...

3 Jun 2024
Biztonsági szemle
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
Pagination
- Previous page ‹‹
- Page 720
- Next page ››