Security Bulletin
7 Aug 2024
Biztonsági szemle
Black Hat Keynote: CrowdStrike outage a global wakeup call
Black Hat USA 2024 kicks off with powerhouse panel waxing on election integrity.
7 Aug 2024
Biztonsági szemle
Critical vulnerabilities in 6 AWS services disclosed at Black Hat USA
The “Shadow Resource” flaws enabled attackers to pre-claim other users’ S3 buckets as their own.
7 Aug 2024
Biztonsági szemle
Massive CrowdStrike outage caused by an out-of-bounds memory error
CrowdStrike admitted in its root cause analysis that a lack of proper testing was part of the cause of the outage.
7 Aug 2024
Biztonsági szemle
Chameleon Banking Trojan Makes a Comeback Cloaked as CRM App
The evolving malware is targeting hospitality and other B2C workers in Canada and Europe with capabilities that can evade Android 13 security restrictions.
7 Aug 2024
Biztonsági szemle
Jumpstart Your Meraki Auto-VPN Journey in the Multi-Cloud Environment
See how to set up a working Auto-VPN architecture in a multi-cloud environment (AWS and Google Cloud). This guide provides actionable steps and techniques for designing and deploying Meraki vMX in a multi-cloud environment.
7 Aug 2024
Biztonsági szemle
Advanced fined by UK following LockBit hack
Infiltration of several Advanced health and care systems through a customer account without multi-factor authentication resulted in the widespread disruption of NHS services that lasted for weeks.
7 Aug 2024
Biztonsági szemle
More details regarding cause of CrowdStrike outage revealed
Aside from inconsistencies between Content Validator inputs and those received by the Content Interpreter, such an issue was also caused by an out-of-bounds flaw in the Content Interpreter and inadequate testing, according to a root cause analysis...
7 Aug 2024
Biztonsági szemle
RCE possible with critical Apache OFBiz zero-day
Such a security issue — which is a patch bypass for the already addressed path traversal flaw, tracked as CVE-2024-36104 — stems from an authentication mechanism vulnerability enabling unauthenticated access to critical endpoints.
7 Aug 2024
Biztonsági szemle
Techniques to evade Windows security alerts detailed
Already exploited by attackers is the "LNK Stomping" method, which involves a Windows shortcut file management vulnerability that disregards Windows Mark of the Web, according to an Elastic Security Labs analysis.
7 Aug 2024
Biztonsági szemle
Creating Insecure AI Assistants With Microsoft Copilot Studio Is Easy
Microsoft claims 50,000 organizations are using its new Copilot Creation tool, but researcher Michael Bargury demonstrated at Black Hat USA ways it could unleash insecure chatbots.
7 Aug 2024
Biztonsági szemle
Nearly 3B stolen National Public Data records exposed
Included in the leaked 227 GB trove of data were individuals' names, addresses, states, counties, cities, and ZIP codes, as well as their Social Security numbers.
7 Aug 2024
Biztonsági szemle
Ransomware impacts dozens of French museums
Operations of the affected museums, some of which are venues for the Summer Olympics, have not been disrupted, but while Louvre Chief of Staff Matthias Grolier denied the incidence of a ransomware attack, unknown threat actors have threatened to...
Pagination
- Previous page ‹‹
- Page 676
- Next page ››