Security Bulletin
6 Mar 2025
Biztonsági szemle
Deepfake Videos of YouTube CEO Phish Creators
YouTube creators are being targeted by scammers seeking out their credentials, using deepfake tactics to lure them in with a false sense of legitimacy.
6 Mar 2025
Biztonsági szemle
US indicts Chinese hackers behind large-scale global attacks
Threat operation APT27, also known as Silk Typhoon, had two of its members indicted.
6 Mar 2025
Biztonsági szemle
Unleashing the Power of AI: Introducing Cisco’s AI-Ready Data Center MVC Campaign
AI and emerging innovations are transforming business operations. Cisco's AI-Ready Data Center Campaign empowers partners to capitalize on this $159 billion opportunity, offering specialized resources and expertise to accelerate AI readiness and...
6 Mar 2025
Biztonsági szemle
Hitachi Energy PCU400
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: PCU400, PCULogger Vulnerabilities: Access of Resource Using Incompatible Type ('Type Confusion'), NULL Pointer...
6 Mar 2025
Biztonsági szemle
Hitachi Energy Relion 670/650/SAM600-IO
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: Relion 670/650/SAM600-IO Vulnerability: Improper Handling of Insufficient Privileges 2. RISK EVALUATION Successful...
6 Mar 2025
Biztonsági szemle
CISA Releases Three Industrial Control Systems Advisories
CISA released three Industrial Control Systems (ICS) advisories on March 6, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-065-01 Hitachi Energy PCU400 ICSA-25...
6 Mar 2025
Biztonsági szemle
FBI Warns of Data Extortion Scam Targeting Corporate Executives
The Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3) has released an alert warning of a scam involving criminal actors masquerading as the “BianLian Group.” The cyber criminals target corporate executives by sending...
6 Mar 2025
Biztonsági szemle
Ransomware Attacks Build Against Saudi Construction Firms
Cybercriminals are ramping up their efforts in the Kingdom and targeting more than just petroleum firms; now, they're aiming for Middle East organizations in the IT, government, construction, and real estate sectors too.
6 Mar 2025
Biztonsági szemle
Cybersecurity's Future Is All About Governance, Not More Tools
As CISOs take a seat at the boardroom table, the focus shifts from stacking security tools to driving accountability, efficiency, and strategic risk management.
6 Mar 2025
Biztonsági szemle
Espionage Actor 'Lotus Blossom' Targets South East Asia
The threat actor, of unknown origin, is deploying a proprietary backdoor malware known as "Sagerunex" against critical infrastructure in Hong Kong, Philippines, Taiwan, and Vietnam.
6 Mar 2025
Biztonsági szemle
ISC Stormcast For Thursday, March 6th, 2025 https://isc.sans.edu/podcastdetail/9352, (Thu, Mar 6th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
6 Mar 2025
Biztonsági szemle
DShield Traffic Analysis using ELK, (Thu, Mar 6th)
Using the Kibana interface, sometimes it can be difficult to find traffic of interest since there can be so much of it. The 3 logs used for traffic analysis are cowrie, webhoneypot and the firewall logs. Other options to add to the honeypot are...
Pagination
- Previous page ‹‹
- Page 396
- Next page ››