Security Bulletin

4 Feb 2025
Biztonsági szemle
Data breach disclosed by Mizuno after BianLian claims
While malicious network activity was first identified by Mizuno in early November, further investigation revealed that the Japanese sportswear company had its systems infiltrated since August, resulting in the periodic theft of individuals' names...

4 Feb 2025
Biztonsági szemle
Updated Coyote malware facilitates more extensive compromise
Attacks with the new Coyote trojan variant over the past month involved the deployment of an LNK file executing a PowerShell command facilitating next-stage PowerShell script retrieval for the eventual launching of the trojan, which not only obtained...

4 Feb 2025
Biztonsági szemle
Some updates to our data feeds, (Tue, Feb 4th)
We have offered several different data feeds via our API or other means. However, we are often not very good at documenting what these feeds are all about. Currently, I am in the process of fixing the documentation around these data feeds.

4 Feb 2025
Biztonsági szemle
Managing Software Risk in a World of Exploding Vulnerabilities
Organizations and development teams need to evolve from "being prepared" to "managing the risk" of security breaches.

4 Feb 2025
Biztonsági szemle
AI, Security, and Your Learning Future at Cisco Live Amsterdam 2025
Get ready to immerse yourself in the heart of innovation with Learning & Certifications at Cisco Live Amsterdam 2025.

4 Feb 2025
Biztonsági szemle
Four Transformative Trends Shaping HR in 2025
Over my last two decades as an HR leader, I’ve had a front-row seat to the evolution of work. Since 2020, that evolution has gone into hyper-drive. AI, the rise of hybrid work, and evolving employee expectations have all played a part in what I...

4 Feb 2025
Biztonsági szemle
Reaching My Ultimate Goal: Cisco Live!
Follow Business Operations Analyst Andrea P.'s mentorship journey through the Women of Cisco Executive Shadow Program to Cisco Live, achieving her ultimate career goal.

4 Feb 2025
Biztonsági szemle
Cybersecurity for Businesses of All Sizes: A Blueprint for Protection
Developing a robust cybersecurity practice involves implementing multiple layers of security measures that are interconnected and continually monitored.
4 Feb 2025
Biztonsági szemle
Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC Vulnerability: Incorrect Calculation of Buffer Size 2. RISK...
4 Feb 2025
Biztonsági szemle
CISA Releases Nine Industrial Control Systems Advisories
CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-035-01 Western Telematic Inc NPS...
4 Feb 2025
Biztonsági szemle
Elber Communications Equipment
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Elber Equipment: Communications Equipment Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel...
4 Feb 2025
Biztonsági szemle
Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M340 and BMXNOE0100/0110, BMXNOR0200H Vulnerability: Exposure of Sensitive Information to an Unauthorized...
Pagination
- Previous page ‹‹
- Page 302
- Next page ››