Security Bulletin
18 Dec 2024
Biztonsági szemle
Manufacturers Lose Azure Creds to HubSpot Phishing Attack
Cyberattackers used fake DocuSign links and HubSpot forms to try to solicit Azure cloud logins from hundreds of thousands of employees across Europe.
18 Dec 2024
Biztonsági szemle
Wallarm Releases API Honeypot Report Highlighting API Attack Trends
18 Dec 2024
Biztonsági szemle
How Visibility Affects the Warfighter
Discover how the digital age is revolutionizing warfare, as technological advancements and cyber capabilities reshape military strategies, highlighting the critical need for real-time network… Read more on Cisco Blogs
18 Dec 2024
Biztonsági szemle
The Importance of Empowering CFOs Against Cyber Threats
Working closely with CISOs, chief financial officers can become key players in protecting their organizations' critical assets and ensuring long-term financial stability.
18 Dec 2024
Biztonsági szemle
Midnight Blizzard Taps Phishing Emails, Rogue RDP Nets
The Russian-based attack group uses legitimate red-team tools, 200 domain names, and 34 back-end RDP servers, making it harder to identify and block malicious activity.
18 Dec 2024
Biztonsági szemle
Cisco’s FY24 Purpose Report: Looking back while looking ahead
As the world enters the intelligent age and Cisco enters its fourth decade, we have an incredible opportunity to drive ethical, responsible, and sustainable leadership – and to bring others along with us. The ability to access and leverage digital...
18 Dec 2024
Biztonsági szemle
Five ways to turn data security into a competitive advantage
Smart companies understand that data security has become a competitive advantage – not just an operational necessity.
18 Dec 2024
Biztonsági szemle
CISA Releases Best Practice Guidance for Mobile Communications
Today, CISA released Mobile Communications Best Practice Guidance. The guidance was crafted in response to identified cyber espionage activity by People’s Republic of China (PRC) government-affiliated threat actors targeting commercial...
18 Dec 2024
Biztonsági szemle
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2018-14933 NUUO NVRmini Devices OS Command Injection Vulnerability CVE-2022-23227 NUUO NVRmini 2 Devices Missing...
18 Dec 2024
Biztonsági szemle
ISC Stormcast For Wednesday, December 18th, 2024 https://isc.sans.edu/podcastdetail/9260, (Wed, Dec 18th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
18 Dec 2024
Biztonsági szemle
Thai Police Systems Under Fire From 'Yokai' Backdoor
Hackers are abusing legitimate Windows utilities to target Thai law enforcement with a novel malware that is a mix of sophistication and amateurishness.
18 Dec 2024
Biztonsági szemle
Rhode Island public benefits data breached in Brain Cipher ransomware attack
Attackers claimed to have stolen at least 1 TB of data from the Deloitte-maintained RIBridges system.
Pagination
- Previous page ‹‹
- Page 7
- Next page ››