Security Bulletin

18 Feb 2025
Biztonsági szemle
OpenSSH flaws could enable man-in-the-middle attacks, denial of service
If the VerifyHostKeyDNS option is activated, an attacker could impersonate a server to hijack SSH sessions.

18 Feb 2025
Biztonsági szemle
AI Threat Intelligence, AI Hacking, Data Breaches, Zhong, DOGE, and more - SWN #452

18 Feb 2025
Biztonsági szemle
Infostealers target major US defense contractors, military personnel
Attackers stole data from U.S. military and Lockheed Martin, Boeing and Honeywell employees for as little as $10 per computer.

18 Feb 2025
Biztonsági szemle
Microsoft: New Variant of macOS Threat XCSSET Spotted in the Wild
Microsoft is warning the modular and potentially wormable Apple-focused infostealer boasts new capabilities for obfuscation, persistence, and infection, and could lead to a supply chain attack.

18 Feb 2025
Biztonsági szemle
https://SecTemplates.com - simplified, free open-source templates to enable engineering and smaller security teams to bootstrap security capabilities for their organizations, (Tue, Feb 18th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

18 Feb 2025
Biztonsági szemle
Chase to decline social media-directed Zelle payments
Chase Bank customers sending Zelle payments may be sought to provide details, including payment purpose and means of contact with recipients, said the bank in an updated user policy.

18 Feb 2025
Biztonsági szemle
Funding round secures $100M for AI cybersecurity startup Dream
Such newly raised funds would be channeled toward creating more advanced AI models for defending critical infrastructure and bolstering its current models, while opening new offices in the U.S. and South America, according to Dream, which was co...

18 Feb 2025
Biztonsági szemle
Severe supply chain flaw impacting newly acquired firm nets over $50K reward
Evaluation of the firm's online resources led to the identification of a DockerHub organization containing a Docker image that not only contained the company's backend systems source code but also a .git folder with a GitHub Actions authorization...

18 Feb 2025
Biztonsági szemle
Authentication credential compromise likely with Xerox VersaLink printer flaws
Threat actors with configuration page access to VersaLink printers with proper Lightweight Directory Access Protocol settings could enable IP address alterations and clear-text LDAP service credential compromise, according to Rapid7 researchers.

18 Feb 2025
Biztonsági szemle
Privacy concerns prompt South Korean suspension of DeepSeek
"This temporary suspension of the DeepSeek app restricts new app downloads from the app market, and we ask existing users to use it cautiously, such as not entering personal information in the DeepSeek input window (prompt) until the final results...
Pagination
- Previous page ‹‹
- Page 269
- Next page ››