Security Bulletin
1 Oct 2024
Biztonsági szemle
UAE, Saudi Arabia Become Plum Cyberattack Targets
Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web.
1 Oct 2024
Biztonsági szemle
ISC Stormcast For Tuesday, October 1st, 2024 https://isc.sans.edu/podcastdetail/9160, (Tue, Oct 1st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
1 Oct 2024
Biztonsági szemle
Cybersecurity experts praise veto of California's AI safety bill
Despite its good intentions, many experts said the bill took a flawed approach to regulating AI safety.
30 Sep 2024
Biztonsági szemle
Calif. Gov. Vetoes AI Safety Bill Aimed at Big Tech Players
Critics viewed the bill as seeking protections against nonrealistic "doomsday" fears, but most stakeholders agree that oversight is needed in the GenAI space.
30 Sep 2024
Biztonsági szemle
Researchers hacked Kia cars armed with only license plate numbers
A team of security researchers discovered a vulnerability that allows for Kia cars to be remotely compromised with nothing more than a license plate number.
30 Sep 2024
Biztonsági szemle
Overtaxed State CISOs Struggle With Budgeting, Staffing
CISOs for US states face the same kinds of challenges those at private companies do: lots of work to handle, but not necessarily enough money or people to handle it sufficiently well.
30 Sep 2024
Biztonsági szemle
DoJ Charges 3 Iranian Hackers in Political 'Hack & Leak' Campaign
The cyberattackers allegedly stole information from US campaign officials only to turn around and weaponize it against unfavored candidates.
30 Sep 2024
Biztonsági szemle
FERC Outlines Supply Chain Security Rules for Power Plants
The US Federal Energy Regulatory Commission spells out what electric utilities should do to protect their software supply chains, as well as their network "trust zones."
30 Sep 2024
Biztonsági szemle
Reachability Analysis Pares Down Static Security-Testing Overload
For development teams awash in vulnerability reports, reachability analysis can help tame the chaos and offer another path to prioritize exploitable issues.
30 Sep 2024
Biztonsági szemle
Louisiana accounting firm breach affects 127,000 customers
Midsize accounting firm takes nearly a year to notify customers of a breach.
30 Sep 2024
Biztonsági szemle
Tool update: mac-robber.py and le-hex-to-ip.py, (Mon, Sep 30th)
One of the problems I've had since I originally wrote mac-robber.py [ 1][ 2][ 3] seven years ago is that because of the underlying os.stat python library we couldn't get file creation times (B-times). Since the release of GNU...
Pagination
- Previous page ‹‹
- Page 637
- Next page ››