Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/6b/Cryptocurrency_Klaus_Ohlenschlaeger_Alamy.jpg.webp?itok=du6SNB3b)
20 Jun 2024
Biztonsági szemle
'Vortax' Meeting Software Builds Elaborate Branding, Spreads Infostealers
The "Markopolo" threat actors built a convincing brand and Web presence for fake software to deliver the dangerous Atomic macOS stealer, among other malware, to carry out cryptocurrency heists.
![](/sites/default/files/styles/narrow_1x/public/feeds/6d/Pleasant-Picture-WF-Sucessful-Story.jpg.webp?itok=1Q70RC69)
20 Jun 2024
Biztonsági szemle
Leveraging technology to empower refugees with secure and equitable access to information, resources, and opportunities
In recognition of World Refugee Day, this blog highlights some of Cisco’s amazing partnerships that through early-stage investment by the Cisco Foundation, have enabled these partners to design, validate, replicate, and scale tech-delivered solutions...
![VPN, or virtual private network provides privacy, anonymity and security to users by creating a private network connection across a public network connection - 3D Illustration Rendering](/sites/default/files/styles/narrow_1x/public/feeds/e6/050824_vpn.jpg.webp?itok=2otbGbY4)
20 Jun 2024
Biztonsági szemle
New network access security guidance unveiled by US, allies
SecurityWeek reports that escalating exploitation of VPN vulnerabilities to facilitate significant cyber incidents has prompted the FBI, Cybersecurity and Infrastructure Security Agency, the Canadian Centre for Cyber Security, and New Zealand's...
![A computer screen displays a digital alert of an email phishing threat, accompanied by a striking red warning sign.](/sites/default/files/styles/narrow_1x/public/feeds/4a/022724_phishing.jpg.webp?itok=l983R0Td)
20 Jun 2024
Biztonsági szemle
Arbitrary code execution likely with Mailcow vulnerabilities
Attackers could leverage a pair of medium-severity vulnerabilities in the Mailcow open-source mail server software older than version 2024-04 to facilitate arbitrary code execution, account takeovers, and sensitive data access, reports The Hacker...
![password to access personal user data, cybersecurity concept](/sites/default/files/styles/narrow_1x/public/feeds/09/052824_password.jpg.webp?itok=q_-TH0w7)
20 Jun 2024
Biztonsági szemle
Amtrak Guest Rewards accounts breached
Amtrak had some of its Guest Rewards customers' data compromised following a credential stuffing attack last month, The Register reports.
![A digital warning sign with "SYSTEM HACKED" in bright red, overlaying a complex background of computer code and digital interfaces, with a deep blue and black color scheme, creating a sense of urgency and alarm.](/sites/default/files/styles/narrow_1x/public/feeds/43/051724_system_hack.jpg.webp?itok=UcSfviNR)
20 Jun 2024
Biztonsági szemle
Cyberattack interrupts Crown Equipment manufacturing
BleepingComputer reports that U.S. industrial forklift truck maker Crown Equipment confirmed that its manufacturing operations have been disrupted following a cyberattack earlier this month that led to the takedown of all its IT systems.
![](/sites/default/files/styles/narrow_1x/public/feeds/6e/ESSER-K12-Education-technology-funding-help.jpg.webp?itok=SNjwEcwF)
20 Jun 2024
Biztonsági szemle
ESSER Funding: Top 3 Ways to Make it Work
Explore 3 ways your K12 school can leverage ESSER funding for new technologies that increase security, collaboration, and distance learning.
![](/sites/default/files/styles/narrow_1x/public/feeds/35/Cybersecurity_symbols%281800%29_Skorzewiak_Alamy.jpg.webp?itok=Zh3oH5JR)
20 Jun 2024
Biztonsági szemle
Catching Up on Innovation With NIST CSF 2.0
The updated framework is an equalizer for smaller organizations to meet the industry at its breakneck pace of innovation.
![](/sites/default/files/styles/narrow_1x/public/feeds/f1/Owen_Slubowski_picture1.png.webp?itok=VZeAnXTc)
20 Jun 2024
Biztonsági szemle
No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary], (Thu, Jun 20th)
[This is a Guest Diary by Owen Slubowski, an ISC intern as part of the SANS.edu BACS program]
![](/sites/default/files/styles/narrow_1x/public/feeds/01/workers-Aleksandr_Davydov-alamy.jpg.webp?itok=Pyly0EgU)
19 Jun 2024
Biztonsági szemle
How Cybersecurity Can Steer Organizations Toward Sustainability
By integrating environmental initiatives, social responsibility, and governance into their strategies, security helps advance ESG goals.
![](/sites/default/files/styles/narrow_1x/public/feeds/06/Phishing_ronstik_Alamy.jpg.webp?itok=lWPPLV8K)
19 Jun 2024
Biztonsági szemle
'ONNX' MFA Bypass Targets Microsoft 365 Accounts
The service, likely a rebrand of a previous operation called "Caffeine," mainly targets financial institutions in the Americas and EMEA and uses malicious QR codes and other advanced evasion tactics.
![](/sites/default/files/styles/narrow_1x/public/feeds/fd/france_Aleksandar_Malivuk_shutterstock.jpg.webp?itok=cc6spGzd)
19 Jun 2024
Biztonsági szemle
France Seeks to Protect National Interests With Bid for Atos Cybersec
By offering to buy Atos' big data and cybersecurity operations. Paris is trying to make sure key technologies do not fall under foreign control.
Pagination
- Previous page ‹‹
- Page 73
- Next page ››