Security Bulletin

16 Aug 2024
Biztonsági szemle
Iran Reportedly Grapples With Major Cyberattack on Banking Systems
The last known cyberattack waged against Iranian infrastructure took place last December with the blame placed on Israel and the US.

16 Aug 2024
Biztonsági szemle
Quantum AI Drones, Ransomhub, Pixel, Mad Liberator, the return of Russ Beauchemin... - SWN #407

16 Aug 2024
Biztonsági szemle
Microsoft Entra ID bug lets attackers impersonate any synched user
Security pros say the Entra ID flaw could let attackers impersonate a user with Global Admin privileges, even the CEO.

16 Aug 2024
Biztonsági szemle
Post-authentication attacks: What they are and how to protect against them
Attackers have moved on from stealing passwords to stealing authentication tokens. Here's how the attacks work, and how to guard against them.

16 Aug 2024
Biztonsági szemle
Are 2024 US Political Campaigns Prepared for the Coming Cyber Threats?
When it comes to this year's candidates and political campaigns fending off major cyberattacks, a lot has changed since the 2016 election cycle.

16 Aug 2024
Biztonsági szemle
Thousands of Oracle NetSuite E-Commerce Sites Expose Sensitive Customer Data
Users of Oracle's ERP for Web storefronts might not be aware of a misconfiguration which could put customer data at risk of exposure.

16 Aug 2024
Biztonsági szemle
RansomHub Rolls Out Brand-New, EDR-Killing BYOVD Binary
After loading a vulnerable driver, the utility uses a public exploit to gain privilege escalation and the ability to disable endpoint protection software.

16 Aug 2024
Biztonsági szemle
CISA, FBI Assure American Voters of Cyber-Safe Electoral Process
Though it is possible for cyber disruptions to occur, CISA and the FBI say that ransomware will not impact casting or counting ballots.

16 Aug 2024
Biztonsági szemle
Why Are Organizations Losing the Ransomware Battle?
Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving threats.

16 Aug 2024
Biztonsági szemle
Securing the developer pipeline: The evolving role of the CISO in today’s threat landscape
Paul Davis, Field CISO at Jfrog, delves into the critical challenges facing today’s information security leaders, particularly in securing development workflows.

16 Aug 2024
Biztonsági szemle
US probe on TP-Link sought amid Chinese cyberattack concerns
Conducting a federal probe on TP-Link was noted by the lawmakers to be crucial following reports that known TP-Link firmware and instance vulnerabilities were leveraged by threat actors to compromise European government officials.

16 Aug 2024
Biztonsági szemle
Critical vulnerabilities in open-source tools for AI identified
Attackers could have leveraged the issue in the Setuptools Python package — which is used to facilitate Python library management and installation in AI models — to enable arbitrary code execution via specially crafted package URLs.
Pagination
- Previous page ‹‹
- Page 514
- Next page ››