Security Bulletin
10 Jun 2024
Biztonsági szemle
Snowflake Cloud Accounts Felled by Rampant Credential Issues
A threat actor has accessed data belonging to at least 165 organizations using valid credentials to their Snowflake accounts, thanks to no MFA and poor password hygiene.
10 Jun 2024
Biztonsági szemle
A Look at the Riskiest Connected Devices of 2024
VoIP gear, hypervisors, medical equipment, building automation, printers, and more pose broad risk to organizations, with many facing danger from a combo of IT, IoT, and OT all at once. This listicle breaks it down.
10 Jun 2024
Biztonsági szemle
VSCode extensions with malicious code installed 229M times
Researchers issued an open letter to Microsoft requesting better security for its IDE marketplace.
10 Jun 2024
Biztonsági szemle
Hackers take aim at Snowflake in newly discovered cloud attacks
Customers of embattled IT services provider Snowflake are being targeted for attacks using stolen credentials.
10 Jun 2024
Biztonsági szemle
Tokenization Moves Beyond Payments to Personal Privacy
Pseudonymous masking has made credit card transactions more secure, but Visa has even greater plans for tokenization: giving users control of their data.
10 Jun 2024
Biztonsági szemle
New York Times Internal Data Nabbed From GitHub
The tranche of data, lifted from underprotected GitHub repositories, reportedly includes source code, though the country's paper of record has not yet confirmed the nature of the data accessed.
10 Jun 2024
Biztonsági szemle
Nvidia patches five high-severity bugs in its software
Nvidia’s high-profile status in the market will lead to an increase in security research.
10 Jun 2024
Biztonsági szemle
Smishers Stand Up Fake Phone Tower to Blast Malicious Texts
London cops make arrests in connection with scam SMS messages, purportedly from official organizations, being sent out from bespoke phone mast.
10 Jun 2024
Biztonsági szemle
The State of the Cybersecurity Market, At Least According to Gartner - Padraic O'Reilly - BSW #353
10 Jun 2024
Biztonsági szemle
Deep Learning to Combat AI Threats & Disrupting the Browser Security Market - Carl Froggett, Vivek Ramachandran - BSW #353
10 Jun 2024
Biztonsági szemle
How to use the perfdhcp benchmarking tool
Private notes NOTE: I promised explanation and example how to use perfdhcp with template feature, and with all screenshots it was actually easier to do it here rather than on mm or email. It could be turned to article about all perfdhcp features and...
10 Jun 2024
Biztonsági szemle
New internet routing security rules proposed by FCC
Increasing security risks associated with the Border Gateway Protocol used for internet routing — including cyberespionage, data theft, and critical infrastructure disruption — has prompted the Federal Communications Commission to propose new rules...
Pagination
- Previous page ‹‹
- Page 779
- Next page ››