Security Bulletin
2 Aug 2024
Biztonsági szemle
GAO: Immediate EPA action in boosting water, wastewater sector cybersecurity needed
Aside from failing to perform risk assessments for the water and wastewater sector, the EPA has not also determined cybersecurity-related objectives, goals, activities, and performance measurements, as well as key roles and efforts coordination...
2 Aug 2024
Biztonsági szemle
Many VMware ESXi instances remain vulnerable to actively exploited bug
Despite the elevated detections, workarounds may have already been applied in some VMware ESXi instances, according to The Shadowserver Foundation.
2 Aug 2024
Biztonsági szemle
Infostealing PyPI packages spread through StackExchange
Threat actors who created StackExchange accounts commented on popular threads with high-quality answers that included links to the packages, including 'spl-types,' 'sol-structs,' 'sol-instruct,' 'raydium,' and 'raydium-sdk,' which facilitated the...
2 Aug 2024
Biztonsági szemle
Hundreds of fake sites used in Facebook-targeted e-commerce fraud
While most of the intrusions involved websites spoofing a leading e-commerce platform and power tools maker, as well as fake sales offers for widely used products, attackers also leveraged fake Facebook user comments to facilitate the scheme.
2 Aug 2024
Biztonsági szemle
Disaster Recovery Steps Up With New Cisco NERVs
When natural disasters or cyberattacks strike, communications are often the first to be impacted. In response, Cisco NERVs are on 24/7 standby for rapid deployment, providing advanced and secure communications for emergency responders during disaster...
2 Aug 2024
Biztonsági szemle
Covert Sitting Ducks domain hijacking attack poses widespread threat
Domains impacted by attacks with Sitting Ducks, which involves the exploitation of domain registrar and authoritative DNS provider misconfigurations and lame delegation, have been leveraged to facilitate various traffic distribution systems...
2 Aug 2024
Biztonsági szemle
Various RATs deployed via TryCloudflare feature exploitation
Intrusions commenced with the delivery of tax-themed phishing emails with attachments or links redirecting to an LNK payload, which executes either BAT or CMD scripts that result in the PowerShell and Python installer deployment before installing the...
2 Aug 2024
Biztonsági szemle
Three ways to prepare for the upcoming CIRCIA cyberattack disclosure law
The new reporting law goes into effect next year – so it’s time for companies to prepare.
2 Aug 2024
Biztonsági szemle
Sajtószemle – 2024. 31. hét
A 2024. 31. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.07.26. és 2024.08.01. között kezelt incidensek statisztikai adatait is tartalmazza.
2 Aug 2024
Biztonsági szemle
ISC Stormcast For Friday, August 2nd, 2024 https://isc.sans.edu/podcastdetail/9080, (Fri, Aug 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2 Aug 2024
Biztonsági szemle
AI-generated emails make up 40% of BEC lures, security firm says
GenAI’s role in phishing and scams continues to raise concerns as overall spam volume rises.
1 Aug 2024
Biztonsági szemle
Attacks on Bytecode Interpreters Conceal Malicious Injection Activity
By injecting malicious bytecode into interpreters for VBScript, Python, and Lua, researchers found they can circumvent malicious code detection.
Pagination
- Previous page ‹‹
- Page 732
- Next page ››