Security Bulletin
12 Jul 2024
Biztonsági szemle
ISC Stormcast For Friday, July 12th, 2024 https://isc.sans.edu/podcastdetail/9050, (Fri, Jul 12th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
11 Jul 2024
Biztonsági szemle
Akira Ransomware: Lightning-Fast Data Exfiltration in 2-ish Hours
The gang's time from initial access to draining data out of a Veeam server is shockingly fast; after which the attackers went on to deploy actual ransomware in less than a day.
11 Jul 2024
Biztonsági szemle
Rockyou2024 is a scam, Google has a whoopsie, and AI is giving folks indigestion - ESW #367
11 Jul 2024
Biztonsági szemle
GitLab patches 2nd critical pipeline vulnerability in last month
CVE-2024-6385, like another bug patched last month, could allow attackers to run pipelines as any user.
11 Jul 2024
Biztonsági szemle
Apple Warns iPhone Users in 98 Countries of More Spyware Attacks
Users receiving the warnings are likely being targeted based on who they are or what they do, according to the vendor.
11 Jul 2024
Biztonsági szemle
Internet Explorer still used as a malware vehicle by threat actors
Microsoft’s notorious Internet Explorer has been brought out of retirement by threat actors using its security holes to serve malware.
11 Jul 2024
Biztonsági szemle
Trade the Comfort of Security Theater for True Security
It's time to wipe off the flattering grease paint and instead make executives see the real face of cybersecurity that works.
11 Jul 2024
Biztonsági szemle
Advance Auto Parts Data Breach Affects 2.3M Customers
Threat actors had access to the automotive provider's networks for more than a month before they were discovered.
11 Jul 2024
Biztonsági szemle
PHP bug executes RCEs, cryptominers and DDoS attacks
Akamai researchers say its honeypots found numerous attempts to exploit recently disclosed vulnerability.
11 Jul 2024
Biztonsági szemle
Understanding SSH Honeypot Logs: Attackers Fingerprinting Honeypots, (Thu, Jul 11th)
Some of the commands observed can be confusing for a novice looking at ssh honeypot logs. Sure, you have some obvious commands like "uname -a" to fingerprint the kernel. However, other commands are less intuitive and are not commands a normal user...
11 Jul 2024
Biztonsági szemle
FishXProxy Phishing Kit Outfits Cybercriminals for Success
A new end-to-end toolkit circulating on the Dark Web significantly lowers the barrier to entry for creating sophisticated campaigns that can avoid most traditional security detection and protection systems.
11 Jul 2024
Biztonsági szemle
Microsoft Melds Identity & SSE With Entra Suite
The integration of Entra Identity offerings with new security service edge (SSE) services to provide unified conditional access is seeking enterprise approval.
Pagination
- Previous page ‹‹
- Page 735
- Next page ››