Security Bulletin
1 Aug 2024
Biztonsági szemle
Location-pointing vulnerability prevalent in dating apps
While all of the identified apps shared exact locations for their "filters" functionality, such an issue has already been addressed by the apps through the rounding up the exact coordinates that rendered oracle trilateration techniques ineffective.
1 Aug 2024
Biztonsági szemle
More patient data exfiltrated in Cencora breach
Major U.S. pharmaceutical firm Cencora has disclosed that more personal and protected health information had been stolen than initially reported during a February cyberattack against a patient support services subsidiary.
1 Aug 2024
Biztonsági szemle
Chinese malware attacks targeted at Japan
Attacks by Cuckoo Spear may have involved the utilization of LODEINFO, which allows file theft, arbitrary shellcode execution, keystroke logging, process termination, and screenshot capturing, as an initial payload.
1 Aug 2024
Biztonsági szemle
Cyberattack confirmed by Fresnillo
Major Mexican precious metals mining firm Fresnillo had its data compromised following a cyberattack against some of its IT systems.
1 Aug 2024
Biztonsági szemle
Novel money-stealing BingoMod Android malware detailed
Threat actors leveraged smishing campaigns to deploy BingoMod in the guise of mobile security tools, such as APP Protection, AVG AntiVirus & Security, and WebSecurity.
1 Aug 2024
Biztonsági szemle
Ongoing DEV#POPPER malware campaign expands targeting
New DEV#POPPER attacks involved the utilization of interview lures to developers aimed at distributing a ZIP archive file, which when executed triggers the BeaverTail malware.
1 Aug 2024
Biztonsági szemle
Feds: US election security not to be impacted by expected DDoS attacks
Attackers could deploy DDoS attacks to disrupt voter look-up systems and unofficial results reporting but not compromise election processes and internal systems to prevent the casting of votes.
1 Aug 2024
Biztonsági szemle
Third-party breaches persist: What you need to know
Third-party access to data remains a serious security concern for enterprise IT executives.
1 Aug 2024
Biztonsági szemle
Cisco Innovating a New Era of Security at Black Hat 2024
It’s almost time for another year of cutting-edge research and innovative talks, as thousands of hackers and security professionals descend upon Las Vegas for Black Hat 2024.
1 Aug 2024
Biztonsági szemle
Johnson Controls exacqVision Web Service
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.6 ATTENTION: Exploitable remotely Vendor: Johnson Controls Inc. Equipment: exacqVision Web Service Vulnerability: Permissive Cross-domain Policy with Untrusted Domains 2. RISK EVALUATION Successful...
1 Aug 2024
Biztonsági szemle
Johnson Controls exacqVision Server
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 6.4 ATTENTION: Exploitable remotely Vendor: Johnson Controls, Inc. Equipment: exacqVision Server Vulnerability: Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of this vulnerability...
Pagination
- Previous page ‹‹
- Page 734
- Next page ››