Security Bulletin

29 Jan 2025
Biztonsági szemle
Patch coming for reported firmware bugs in Palo Alto firewalls
Eclypsium, the enterprise firmware and hardware security firm that discovered the flaws, analyzed three firewall models: PA-3260, PA-1410, and PA-415, and reported that all were affected by the BootHole vulnerability, a GRUB2 bootloader flaw that...

29 Jan 2025
Biztonsági szemle
AMD acknowledges microcode vulnerability
The issue was described as a microcode signature verification vulnerability and could potentially allow unauthorized microcode to bypass verification mechanisms and be loaded into affected CPUs.

29 Jan 2025
Biztonsági szemle
Barracuda launches account takeover protection capabilities
The tool's latest features focus on proactive prevention of account compromise and enhanced threat response capabilities, as well ways to make these capabilities available to a broader range of customers.

29 Jan 2025
Biztonsági szemle
Microsoft unveils scareware blocker for Edge
The new security tool is integrated into the company's Edge browser and uses machine learning and computer vision to identify fraudulent full-screen pop-ups that trick users into installing malware or purchasing unnecessary software.

29 Jan 2025
Biztonsági szemle
Account takeover flaw discovered in popular travel booking service
The flaw could have allowed threat actors to take control of user accounts, enabling them to impersonate targets when booking or canceling reservations and using victims' airline loyalty points.

29 Jan 2025
Biztonsági szemle
The Old Ways of Vendor Risk Management Are No Longer Good Enough
Managing third-party risk in the SaaS era demands a proactive, data-driven approach beyond checkbox compliance.

29 Jan 2025
Biztonsági szemle
IPv6 in 2025 – Where Are We?
Learn how IPv6 is finally gaining momentum, offering fresh opportunities as we move beyond the limits of IPv4.
29 Jan 2025
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation , as confirmed by Fortinet. CVE-2025-24085 Apple Multiple Products Use-After-Free Vulnerability These types of...

29 Jan 2025
Biztonsági szemle
From PowerShell to a Python Obfuscation Race!, (Wed, Jan 29th)
Attackers like to mix multiple technologies to improve the deployment of their malicious code. I spotted a small script that drops a Python malware. The file was sent on VirusTotal and got a score of 2/60![ 1] (SHA256...

29 Jan 2025
Biztonsági szemle
ISC Stormcast For Wednesday, January 29th, 2025 https://isc.sans.edu/podcastdetail/9300, (Wed, Jan 29th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

29 Jan 2025
Biztonsági szemle
DeepSeek rollout prompts White House response to 'ensure AI dominance'
White House press secretary calls DeepSeek's emergence a "wake-up call for the American AI industry."

29 Jan 2025
Biztonsági szemle
7 Tips for Strategically Saying 'No' in Cybersecurity
Cybersecurity can't always be "Department of No," but saying yes all the time is not the answer. Here is how to enable innovation gracefully without adding risk to the organization.
Pagination
- Previous page ‹‹
- Page 314
- Next page ››