Security Bulletin
25 Jun 2024
Biztonsági szemle
CISOs Advising Cybersecurity Companies, Get on Board! - Bob West - CSP #180
25 Jun 2024
Biztonsági szemle
Key Takeaways From the British Library Cyberattack
Knowledge institutions with legacy infrastructure, limited resources, and digitized intellectual property must protect themselves from sophisticated and destructive cyberattacks.
25 Jun 2024
Biztonsági szemle
Executives bullish about AI capabilities, but worry about data privacy and security
More than 100 CISOs, CIOs, CTOs and CSOs polled worldwide are remarkably optimistic about the potential uses and benefits of artificial intelligence, although they have some concerns.
25 Jun 2024
Biztonsági szemle
Celebrating Authenticity at Cisco and London Pride
When QA Engineer Liam H. joined Cisco and its Inclusive Communities, he discovered a place where he could truly bring his full self to work.
25 Jun 2024
Biztonsági szemle
'P2PInfect' Worm Grows Teeth With Miner, Ransomware & Rootkit
For a while, the botnet spread but did essentially nothing. All the malicious payloads came well after.
25 Jun 2024
Biztonsági szemle
ISC Stormcast For Tuesday, June 25th, 2024 https://isc.sans.edu/podcastdetail/9034, (Tue, Jun 25th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
25 Jun 2024
Biztonsági szemle
China-Linked Cyber-Espionage Teams Target Asian Telecoms
In the latest breaches, threat groups compromised telecommunications firms in at least two Asian nations, installing backdoors and possibly eavesdropping or pre-positioning for a future attack.
24 Jun 2024
Biztonsági szemle
CDK Attack: Why Contingency Planning Is Critical for SaaS Customers
Daily operations at some 15,000 automotive dealers remain impacted as CDK works to restore its dealer management system, following what appears to be a ransomware attack last week.
24 Jun 2024
Biztonsági szemle
What Building Application Security Into Shadow IT Looks Like
AppSec is hard for traditional software development, let alone citizen developers. So how did two people resolve 70,000 vulnerabilities in three months?
24 Jun 2024
Biztonsági szemle
30M Potentially Affected in Tickettek Australia Cloud Breach
In an incident with direct parallels to the recent Ticketmaster compromise, an Aussie live events giant says it was breached via a third-party cloud provider, as ShinyHunters takes credit.
24 Jun 2024
Biztonsági szemle
The NYSE's $10M Wake-up Call
The settlement between the SEC and the owner of the New York Stock Exchange is a critical reminder of the vulnerabilities within financial institutions' cybersecurity frameworks as well as the importance of regulatory oversight.
24 Jun 2024
Biztonsági szemle
Configuration Scanners Adding Java Specific Configuration Files, (Mon, Jun 24th)
Hunting for configuration files is one of the favorite tricks we typically see used against our honeypots. Traditionally, standard and more generic configuration files like ".env" or ".config" are the target, with some cloud-specific configuration...
Pagination
- Previous page ‹‹
- Page 764
- Next page ››