Security Bulletin
3 Jun 2024
Biztonsági szemle
CISA's Secure by Design Initiative at 1: A Report Card
There is more that needs to be done, but, so far, the initiative is a success.
3 Jun 2024
Biztonsági szemle
Apache Log4j threat persists in global finance sector
Organizations in the financial industry around the world were warned by cyber threat intelligence expert Anis Haboubi regarding the persistent risk of attacks exploiting the years-old Apache Log4j2 vulnerability, tracked as CVE-2021-44832, as...
3 Jun 2024
Biztonsági szemle
More info on Emotet leader sought by international operation
International law enforcement agencies behind Operation Endgame, which has been touted to be the biggest anti-botnet and dropper malware operation, have called for more information regarding the leader of the Emotet botnet operation dubbed "Odd," who...
3 Jun 2024
Biztonsági szemle
Funding a Whole of State Approach for your Community
As you consider how to leverage SLCGP grants for a whole of state approach, here are five things Cisco account managers and partners should be aware of.
3 Jun 2024
Biztonsági szemle
XDR means so much more than some may realize
Discover how Cisco XDR redefines security with integrated tools, AI-driven threat detection, and rapid response to solve real-world problems for the SOC
3 Jun 2024
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2017-3506 Oracle WebLogic Server OS Command Injection Vulnerability These types of vulnerabilities are frequent attack...
3 Jun 2024
Biztonsági szemle
A Wireshark Lua Dissector for Fixed Field Length Protocols, (Mon, Jun 3rd)
I developed a Wireshark dissector in Lua to parse binary protocols (over TCP) that are composed of fields with fixed lengths. I got this idea while taking a SANS ICS training: for protocol reversing, it would be useful to have a dissector where I can...
3 Jun 2024
Biztonsági szemle
Three ways to deliver API security
Here are three ways to build APIs that deliver the functionality and security modern organizations need.
3 Jun 2024
Biztonsági szemle
Nyaralni megy? Tippek, hogy utazása „kiberbiztonságban” teljen – SANS OUCH! – 2024. június
Megjelent a SANS és a Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet közös kiadványának 2024. júniusi száma, melyben tippeket adunk arra, hogyan őrizhetjük meg "kiberbiztonságunkat" az utazások alatt is.
3 Jun 2024
Biztonsági szemle
Improved Guidance for Azure Network Service Tags
Summary Microsoft Security Response Center (MSRC) was notified in January 2024 by our industry partner, Tenable Inc., about the potential for cross-tenant access to web resources using the service tags feature. Microsoft acknowledged that Tenable...
3 Jun 2024
Biztonsági szemle
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
3 Jun 2024
Biztonsági szemle
ISC Stormcast For Monday, June 3rd, 2024 https://isc.sans.edu/podcastdetail/9006, (Mon, Jun 3rd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Pagination
- Previous page ‹‹
- Page 795
- Next page ››