Security Bulletin
13 Mar 2025
Biztonsági szemle
Sungrow iSolarCloud Android App WiNet Firmware
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.5 ATTENTION: Exploitable remotely Vendor: Sungrow Equipment: iSolarCloud Android App, WiNet Firmware Vulnerabilities: Improper Certificate Validation, Use of a Broken or Risky Cryptographic Algorithm...

13 Mar 2025
Biztonsági szemle
OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack
Researchers from Symantec showed how OpenAI's Operator agent, currently in research preview, can be used to construct a basic phishing attack from start to finish.

13 Mar 2025
Biztonsági szemle
Leading the Charge: Delaware State University’s Digital Evolution
Delaware State University has transformed its digital landscape through a strategic partnership with Cisco, enhancing cybersecurity, educational technology, and student success, positioning itself as a leader in technological innovation.

13 Mar 2025
Biztonsági szemle
Abu Dhabi Guidelines Offer Blueprint for Cybersecurity in Health
Following increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare.

13 Mar 2025
Biztonsági szemle
ISC Stormcast For Thursday, March 13th, 2025 https://isc.sans.edu/podcastdetail/9362, (Thu, Mar 13th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

13 Mar 2025
Biztonsági szemle
File Hashes Analysis with Power BI from Data Stored in DShield SIEM, (Wed, Mar 12th)
I previously used Power BI [ 2] to analyze DShield sensor data and this time I wanted to show how it could be used by selecting certain type of data as a large dataset and export it for analysis. This time, I ran a query in Elastic Discover and...

12 Mar 2025
Biztonsági szemle
Healthcare cybersecurity set for AI boom in 2025
According to a CRA survey, 50% of healthcare organizations are already using AI tools in their cybersecurity practices.

12 Mar 2025
Biztonsági szemle
Android spyware ‘KoSpy’ spread by suspected North Korean APT
Malicious apps previously in the Google Play Store enabled theft of messages, files and more.

12 Mar 2025
Biztonsági szemle
XCSSET macOS malware variant targets Xcode projects of app developers
XCSSET variant features enhanced stealth features that can lead to the exfiltration of sensitive financial information.
12 Mar 2025
Biztonsági szemle
China-Backed Hackers Backdoor US Carrier-Grade Juniper MX Routers
Mandiant researchers found the routers of several unnamed organizations (likely telcos and ISPs) were hacked by UNC3886, and contained a custom backdoor called "TinyShell."

12 Mar 2025
Biztonsági szemle
CISO vs. CIO, as CISOs Are Opting for Consulting Gigs and Cyber Pros Look for Change - BSW #386
12 Mar 2025
Biztonsági szemle
NIST Finalizes Differential Privacy Rules to Protect Data
The National Institute of Standards and Technology (NIST) released updated differential privacy guidelines for organizations to follow to protect personally identifiable information when sharing data.
Pagination
- Previous page ‹‹
- Page 84
- Next page ››