Security Bulletin
11 Jul 2024
Biztonsági szemle
Internet Explorer still used as a malware vehicle by threat actors
Microsoft’s notorious Internet Explorer has been brought out of retirement by threat actors using its security holes to serve malware.
11 Jul 2024
Biztonsági szemle
Trade the Comfort of Security Theater for True Security
It's time to wipe off the flattering grease paint and instead make executives see the real face of cybersecurity that works.
11 Jul 2024
Biztonsági szemle
Advance Auto Parts Data Breach Affects 2.3M Customers
Threat actors had access to the automotive provider's networks for more than a month before they were discovered.
11 Jul 2024
Biztonsági szemle
PHP bug executes RCEs, cryptominers and DDoS attacks
Akamai researchers say its honeypots found numerous attempts to exploit recently disclosed vulnerability.
11 Jul 2024
Biztonsági szemle
Understanding SSH Honeypot Logs: Attackers Fingerprinting Honeypots, (Thu, Jul 11th)
Some of the commands observed can be confusing for a novice looking at ssh honeypot logs. Sure, you have some obvious commands like "uname -a" to fingerprint the kernel. However, other commands are less intuitive and are not commands a normal user...
11 Jul 2024
Biztonsági szemle
FishXProxy Phishing Kit Outfits Cybercriminals for Success
A new end-to-end toolkit circulating on the Dark Web significantly lowers the barrier to entry for creating sophisticated campaigns that can avoid most traditional security detection and protection systems.
11 Jul 2024
Biztonsági szemle
Microsoft Melds Identity & SSE With Entra Suite
The integration of Entra Identity offerings with new security service edge (SSE) services to provide unified conditional access is seeking enterprise approval.
11 Jul 2024
Biztonsági szemle
How to Optimize Remote Work
Choosing the right remote work systems for your SMB is easy. We have a large list of customizable solutions that can keep your teams connected and secure.
11 Jul 2024
Biztonsági szemle
'Crystalray' Attacks Jump 10X, Using Only OSS to Steal Credentials
Remember when hackers used to write their own malware? Kids these days don't want to work, they just want freely available tools to do it for them.
11 Jul 2024
Biztonsági szemle
Centralized Cyber-Incident Reporting Can Improve Effectiveness
Companies need robust cyber-response plans and a straightforward path to transparency.
11 Jul 2024
Biztonsági szemle
Mandatory MFA option unveiled by Snowflake
While the new policy could be adopted based on Snowflake customers' preferences, OAuth and other key-pair authentication systems are still recommended for service users.
11 Jul 2024
Biztonsági szemle
Microsoft chided for spam-looking APT29 hack notifications
Organizations affected by the breach have been urged by security researcher and former Microsoft employee Kevin Beaumont to be vigilant of the emails, which were not sent in adherence to the Microsoft 365 breach process.
Pagination
- Previous page ‹‹
- Page 734
- Next page ››