Security Bulletin
1 Feb 2024
Biztonsági szemle
CMMC Is the Starting Line, Not the Finish
Cybersecurity Maturity Model Certification (CMMC) and a harden, detect, and respond mindset are key to protecting defense and critical infrastructure companies.
1 Feb 2024
Biztonsági szemle
3 ISIS Members Slapped With Sanctions From US Treasury
New sanctions aim to disrupt their cyber and financial operations.
1 Feb 2024
Biztonsági szemle
Feds untether hundreds of routers from Volt Typhoon botnet
The Justice Department and FBI confirmed they had disrupted the botnet run by a Chinese APT group targeting U.S. critical infrastructure.
1 Feb 2024
Biztonsági szemle
What is a "Top Level Domain"?, (Thu, Feb 1st)
In yesterday's diary, I discussed a new proposed top-level domain, ".internal". This reminded me to talk a bit about what a top-level domain is all about, and some different ways to look at the definition of a top-level domain.
1 Feb 2024
Biztonsági szemle
Several Juniper Networks Junos OS flaws addressed
Numerous security issues impacting Juniper Networks' Junos OS and its J-Web configuration interface leveraged by its EX switches and SRX firewalls have been resolved as part of recently issued updates, reports SecurityWeek.
1 Feb 2024
Biztonsági szemle
Interview: Former FBI Analyst on the CJIS MFA Mandate & Duo
Hear how law enforcement agencies can more easily meet the new MFA mandates from the FBI CJIS Security Policy using Cisco Duo in this interview.
1 Feb 2024
Biztonsági szemle
Cisco Revolutionizes Networking with Pay-As-You-Go for Equinix Network Edge and Equinix Fabric
Today Cisco and Equinix have agreed to make Equinix Network Edge, Equinix Fabric and Device Link Groups available as a Pay-As-You-Go (PAYG) offer through the Cisco Solutions Plus program.
1 Feb 2024
Biztonsági szemle
The Cost of Not Conducting a Network Infrastructure Risk Assessment: A Costly Gamble
In today's ever changing digital world, businesses rely on robust network infrastructures to function efficiently and operate securely. With the rise of cyber threats, however, organizations are at a critical point in time where vulnerabilities to...
1 Feb 2024
Biztonsági szemle
Online White Phoenix ransomware decryptor tool released
BleepingComputer reports that the White Phoenix ransomware decryption tool has been made available on the web by CyberArk to ease the recovery from attacks involving ransomware strains with intermittent encryption, such as ALPHV/BlackCat, BianLian...
1 Feb 2024
Biztonsági szemle
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on February 1, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-032-01 Gessler GmbH WEB-MASTER ICSA...
1 Feb 2024
Biztonsági szemle
Gessler GmbH WEB-MASTER
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable Remotely/Low attack complexity Vendor: Gessler GmbH Equipment: WEB-MASTER Vulnerabilities: Use of Weak Credentials, Use of Weak Hash 2. RISK EVALUATION Successful exploitation of these...
1 Feb 2024
Biztonsági szemle
AVEVA Edge products (formerly known as InduSoft Web Studio)
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Low attack complexity Vendor: AVEVA Equipment: AVEVA Edge products (formerly known as InduSoft Web Studio) Vulnerability: Uncontrolled Search Path Element 2. RISK EVALUATION Successful...
Pagination
- Previous page ‹‹
- Page 1028
- Next page ››