Security Bulletin

20 Apr 2025
Biztonsági szemle
Wireshark 4.4.6 Released, (Sun, Apr 20th)
Wireshark release 4.4.6 fixes 14 bugs.

18 Apr 2025
Biztonsági szemle
Alarms sound over attacks via Microsoft NTLM vulnerability
Attacks targeting government and contractor companies in Poland and Romania via NTLM exploit.

18 Apr 2025
Biztonsági szemle
HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet... - SWN #469

18 Apr 2025
Biztonsági szemle
HHS fines Guam hospital over ransomware attack, HIPAA violations
A ransomware attack and incident involving former employees led to potential HIPAA violations.

18 Apr 2025
Biztonsági szemle
Could Ransomware Survive Without Cryptocurrency?
Threat actors would be at least temporarily derailed, experts say. But the real issue ladders back to organizations’ weak cyber hygiene.

18 Apr 2025
Biztonsági szemle
AWWA Supports Introduction of Collaborative Cybersecurity Legislation

18 Apr 2025
Biztonsági szemle
Organizations Fix Less Than Half of All Exploitable Vulnerabilities, With Just 21% of GenAI App Flaws Resolved

18 Apr 2025
Biztonsági szemle
Discover the Cisco Catalyst Center Fundamentals (CCFND) Training Program
Take your networking skills to the next level with the Cisco Catalyst Center Fundamentals (CCFND) training program, designed to provide you with a thorough understanding of Cisco Catalyst Center and its latest features and capabilities.

18 Apr 2025
Biztonsági szemle
Legends International notifies customers, employees of data breach
Sports venue support company said sensitive information was stolen, but offers no further details.

18 Apr 2025
Biztonsági szemle
Attackers and Defenders Lean on AI in Identity Fraud Battle
Identity verification, insurance claims, and financial services are all seeing surges in AI-enabled fraud, but organizations are taking advantage of AI systems to fight fire with fire.

18 Apr 2025
Biztonsági szemle
Chinese APT Mustang Panda Debuts 4 New Attack Tools
The notorious nation-state-backed threat actor has added two new keyloggers, a lateral movement tool, and an endpoint detection and response (EDR) evasion driver to its arsenal.

18 Apr 2025
Biztonsági szemle
CISA Weighs In on Alleged Oracle Cloud Breach
The agency is recommending that organizations and individuals implement its recommendations to prevent the misuse of stolen data, though Oracle has yet to publicly do the same for its customers.
Pagination
- Page 1
- Next page ››