Security Bulletin
2 Aug 2024
Biztonsági szemle
Even Linux users should take a look at this Microsoft KB article., (Fri, Aug 2nd)
Secure boot has been a standard feature since at least Windows 8. As the name implies, the feature protects the boot process. The integrity of the boot process is ensured by digitally signing any software ("firmware") used during the boot process. As...
2 Aug 2024
Biztonsági szemle
Questions to ask before you shop for a consolidated security platform
There are many good reasons to adopt a consolidated security platform -- but there are also several things to consider before you take that step.
2 Aug 2024
Biztonsági szemle
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
2 Aug 2024
Biztonsági szemle
Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
2 Aug 2024
Biztonsági szemle
China's APT41 Targets Taiwan Research Institute for Cyber Espionage
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.
2 Aug 2024
Biztonsági szemle
Twilio Users Kicked Out of Desktop App, Forced to Switch to Mobile
Now that the Authy Desktop app has reached EOL and is no longer accessible, users are hoping their 2FA tokens synced correctly with their mobile devices.
2 Aug 2024
Biztonsági szemle
Rhysida auctions Columbus data after city halts ransomware encryption
The ransomware gang claims to have 6.5 TB of data on city employees and emergency services.
2 Aug 2024
Biztonsági szemle
Attackers exploit StackExchange to load malicious packages to PyPI
Checkmarx researchers say the infostealer malware exfiltrated sensitive data and drained the crypto wallets of developers.
2 Aug 2024
Biztonsági szemle
Is the US Federal Government Increasing Cyber-Risk Through Monoculture?
In a monoculture, cybercriminals need to look for a weakness in only one product, or discover an exploitable vulnerability, to affect a significant portion of services.
2 Aug 2024
Biztonsági szemle
Remote SMB Security—Protect Your Business While Traveling
While summer is synonymous with vacations and relaxation, small and medium-sized business (SMB) owners cannot afford to let their cybersecurity take a break alongside their employees. Statistics show that 43% of cyberattacks target small businesses...
2 Aug 2024
Biztonsági szemle
Disney, Nike, IBM Signatures Anchor 3M Fake Emails a Day
A simple toggle in Proofpoint's email service allowed for brand impersonation at an industrial scale. It prompts the question: Are secure email gateways (SEGs) secure enough?
2 Aug 2024
Biztonsági szemle
Implementing Identity Continuity With the NIST Cybersecurity Framework
Having a robust identity continuity plan is not just beneficial but essential for avoiding financially costly and potentially brand-damaging outages.
Pagination
- Previous page ‹‹
- Page 685
- Next page ››