Security Bulletin
22 Nov 2024
Biztonsági szemle
Meta cracks down on over 2M pig butchering-associated accounts
Over 2 million accounts linked to pig butchering scams in Cambodia, Myanmar, Laos, the Philippines, and the United Arab Emirates have been dismantled by Facebook parent Meta so far this year as part of pig butchering scam crackdown efforts that...
22 Nov 2024
Biztonsági szemle
Global ICS exposures exceed 145K, report reveals
Internet-exposed ICS was most prevalent in the U.S., followed by Turkey, South Korea, Italy, and Canada, a report from Censys showed.
22 Nov 2024
Biztonsági szemle
Novel WolfsBane backdoor leveraged in Chinese attacks against Linux systems
Attacks with Wolfsbane commence with the deployment of the 'cron' dropper delivering the KDE desktop component-spoofing launcher, which deactivates SELinux and alters user configuration files before triggering the privacy malware component that has...
22 Nov 2024
Biztonsági szemle
ONNX phishing-as-a-service operation disrupted
Organizations in the financial services sector have been primarily targeted by the ONNX, whose Telegram-based operations had been cut off following a court order that allowed Microsoft to transfer the PhaaS platform's infrastructure to its servers...
22 Nov 2024
Biztonsági szemle
Tesla, Druids, Salt Typhoon, North Korea, Amazon, Microsoft, Google, Joshua Marpet... - SWN #433
22 Nov 2024
Biztonsági szemle
Leaky Cybersecurity Holes Put Water Systems at Risk
At least 97 major water systems in the US have serious cybersecurity vulnerabilities and compliance issues, raising concerns that cyberattacks could disrupt businesses, industry, and the lives of millions of citizens.
22 Nov 2024
Biztonsági szemle
Why Cisco Leads with Wi-Fi 7: Transforming Future Connectivity
This blog explores why Cisco is the leading choice for Wi-Fi 7, showcasing innovative solutions that provide enhanced speed, security, and reliability. Learn how Cisco helps future-proof your network for the next era of connectivity.
22 Nov 2024
Biztonsági szemle
Going Beyond Secure by Demand
Secure by Demand offers a starting point for third-party risk management teams, but they need to take the essential step of using a mature software supply chain security solution to ensure they're not blindly trusting a provider's software.
22 Nov 2024
Biztonsági szemle
China's Cyber Offensives Built in Lockstep With Private Firms, Academia
The scale of Beijing's systematic tapping of private industry and universities to build up its formidable hacking and cyber-warfare capabilities is larger than previously understood.
22 Nov 2024
Biztonsági szemle
Microsoft Highlights Security Exposure Management at Ignite
Building on its broad security portfolio, Microsoft's new exposure management is now available in the Microsoft Defender portal, with third-party-connectors on the way.
22 Nov 2024
Biztonsági szemle
The Customer Adoption Journey of Cisco Secure Workload
Explore the customer adoption journey of Cisco Secure Workload, with key stages and best practices for successful implementation highlighted.
22 Nov 2024
Biztonsági szemle
Sajtószemle – 2024. 47. hét
A 2024. 47. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.11.15. és 2024.11.21. között kezelt incidensek statisztikai adatait is tartalmazza.
Pagination
- Previous page ‹‹
- Page 545
- Next page ››