Security Bulletin
23 Jan 2025
Biztonsági szemle
The Security Risk of Rampant Shadow AI
While employees want to take advantage of the increased efficiency of GenAI and LLMs, CISOs and IT teams must be diligent and stay on top of the most up-to-date security regulations.
23 Jan 2025
Biztonsági szemle
Black 'Magic' Targets Enterprise Juniper Routers With Backdoor
Such routers typically lack endpoint detection and response protection, are in front of a firewall, and don't run monitoring software like Sysmon, making the attacks harder to detect.
23 Jan 2025
Biztonsági szemle
Improved endpoint security aimed by Citrix with Unicon purchase
Integration of Unicon's Scout enterprise platform in the fold of Citrix would enable the latter's customers to facilitate extensive endpoint management and x86 device platform assimilation ensuring seamless end-to-end corporate app access.
23 Jan 2025
Biztonsági szemle
Data recovery after fulfilling ransomware attack demands mostly unlikely
Only 7% of ransomware-hit organizations around the world were able to recover all their stolen data after paying the ransoms sought by their attackers.
23 Jan 2025
Biztonsági szemle
Increased cybersecurity cooperation forged by Russia, Iran
Russia and Iran have agreed to advance digital space regulations for international tech firms and share know-how on managing the internet, which was declared by human rights nonprofit Freedom House to be "not free" in both countries amid intense...
23 Jan 2025
Biztonsági szemle
User location data exposure threatened by Cloudflare CDN vulnerability
With Cloudflare conducting media resource caching at the data center closest in proximity to its users, security researcher Daniel discovered that an information-disclosure intrusion could be conducted through the delivery of a unique image hosted on...
23 Jan 2025
Biztonsági szemle
Widespread AIRASHI botnet detailed in new report
Aside from the zero-day, threat actors behind AIRASHI also leveraged more than a dozen other security flaws impacting AVTECH IP cameras, Shenzhen TVT appliances, and other devices dating as far back as 2013, a report from QiAnXin XLab researchers...
23 Jan 2025
Biztonsági szemle
Ivanti CSA exploit chains examined in joint CISA, FBI advisory
Attacks with the chained vulnerabilities have been thwarted by three organizations, with the first preventing compromise following sysadmin identification of suspicious user accounts and the second averting the breach after an endpoint protection...
23 Jan 2025
Biztonsági szemle
Malware deployed via new ClickFix attack variant using Silk Road founder as lure
Attackers who made fraudulent but verified Ross Ulbricht accounts on X, formerly Twitter, sought to lure users into joining Telegram channels purporting to be Ulbricht portals, which provided a walk through on the bogus Safeguard identity...
23 Jan 2025
Biztonsági szemle
New Chinese cyberespionage campaign targeted South Korean VPN service
Execution of a trojanized installer triggers deployment of a loader with another DLL eventually resulting in the running of SlowStepper, which supports commands enabling extensive system info theft, file deletion, Python module execution, and self...
23 Jan 2025
Biztonsági szemle
XSS Attempts via E-Mail, (Thu, Jan 23rd)
One of the hardest applications to create securely is webmail. E-mail is a complex standard, and almost all e-mail sent today uses HTML. Displaying complex HTML received in an e-mail within a web application is dangerous and often leads to XSS...
23 Jan 2025
Biztonsági szemle
Navigating E-rate for FY2025: Key Deadlines and New Opportunities
Stay ahead in FY2025 with crucial E-rate deadlines and Cisco's cybersecurity solutions to enhance your educational technology infrastructure.
Pagination
- Previous page ‹‹
- Page 390
- Next page ››