Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/07/hardwaresecurity-Mentor58-alamy.jpg.webp?itok=GkKwXjZF)
2024. júl. 26.
Biztonsági szemle
Could Intel Have Fixed Spectre & Meltdown Bugs Earlier?
Intel works closely with academic researchers on hardware flaws and coordinates efforts with other vendors to roll out fixes for emerging vulnerabilities. That wasn't always the case.
![The United States Capitol building is seen at sunrise in Washington](/sites/default/files/styles/narrow_1x/public/feeds/d6/041024_us_capitol.jpg.webp?itok=_U4MQ9Km)
2024. júl. 26.
Biztonsági szemle
Streamlined cyber regulations pushed by industries
CyberScoop reports that House lawmakers have been urged by IT, banking, and oil and natural gas industry representatives to streamline cybersecurity regulations amid the presence of duplicative, inconsistent, and conflicting rules.
![A digital warning sign with "SYSTEM HACKED" in bright red, overlaying a complex background of computer code and digital interfaces, with a deep blue and black color scheme, creating a sense of urgency and alarm.](/sites/default/files/styles/narrow_1x/public/feeds/43/051724_system_hack.jpg.webp?itok=UcSfviNR)
2024. júl. 26.
Biztonsági szemle
US cities, municipalities hit by separate cyberattacks
Investigation into the incident, which may have been caused by a successful phishing attack, is still underway, reported officials, who noted that the recovery of impacted law enforcement systems is being prioritized.
![cyber threat risk management , malware and virus prevention , security awareness](/sites/default/files/styles/narrow_1x/public/feeds/2f/1106_malware.jpg.webp?itok=4e5i47e5)
2024. júl. 26.
Biztonsági szemle
UEFI malware delivery possible with PKfail issue
Such a vulnerability stems from impacted devices' usage of an American Megatrends International-generated Platform Key with the "DO NOT TRUST" tag that the vendors should have replaced, according to a report from the Binarly Research Team.
![Spyware In Your Data](/sites/default/files/styles/narrow_1x/public/feeds/ff/032923_spyware.jpg.webp?itok=ZooI_VEt)
2024. júl. 26.
Biztonsági szemle
Extensive spyware compromise revealed by Spytech breach
Information exposed by the hacking incident revealed not only all devices infected with Spytech spyware, most of which were Windows PCs, but also their unencrypted activity logs.
![Debugging binary code with bug inside magnifying glass](/sites/default/files/styles/narrow_1x/public/feeds/21/AdobeStock_86906051-scaled.jpeg.webp?itok=bFcAieLc)
2024. júl. 26.
Biztonsági szemle
Attacks exploiting critical ServiceNow RCE bugs underway
Identification of the critical arbitrary code execution bugs, tracked as CVE-2024-4879 and CVE-2024-5217, as well as the medium severity flaw, tracked as CVE-2024-5178, has been followed by widespread network scanning for vulnerable instances.
![Closeup of mobile phone screen with logo lettering of crowdstrike cyber security company on computer keyboard](/sites/default/files/styles/narrow_1x/public/feeds/45/072424_crowdstike_logo.jpg.webp?itok=kWr7Ukpx)
2024. júl. 26.
Biztonsági szemle
CrowdStrike outage exploited for Lumma infostealer deployment
Intrusions involved the use of the domain, crowdstrike-office365[.]com, to lure users into downloading a recovery tool purportedly addressing update-related boot loop issues but delivers a malware loader.
![](/sites/default/files/styles/narrow_1x/public/feeds/3e/020624_spyware.jpg.webp?itok=S23-y47D)
2024. júl. 26.
Biztonsági szemle
Financially motivated attacks part of Andariel expansion
Attacks against defense and government organizations worldwide have enabled APT45 to steal information regarding missiles and missile defense systems, nuclear power plants, radar systems, fighter aircraft and unmanned aerial vehicles, and satellites...
![Computer keyboard, close-up button of the flag of North Korea.](/sites/default/files/styles/narrow_1x/public/feeds/6b/1127_north_korea-e1704488987937.jpg.webp?itok=fXobV-Uh)
2024. júl. 26.
Biztonsági szemle
US indicts, places bounty on Andariel hacker amid joint advisory on threat group
Ransoms extorted by Rim and his co-conspirators from healthcare providers across the U.S. have been leveraged to support additional attacks against the country's government organizations and foreign defense contractors.
![Preparing for the Summer Olympics](/sites/default/files/styles/narrow_1x/public/feeds/80/072524_paris_olympics.jpg.webp?itok=goQARzLk)
2024. júl. 26.
Biztonsági szemle
How companies can secure their data as the Summer Olympics begin — and the threat landscape amps up
Authorities expect even more API attacks on businesses working the Summer Olympics in Paris this year – here’s how to mitigate the impact.
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”13031″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/e8/ESW_369_seg_3__da259e82-6382-43b6-92a9-d8f035e15e27.jpg.webp?itok=K88PgjRW)
2024. júl. 26.
Biztonsági szemle
AI Ruining the Internet, Crowdstrike Post Mortem, Wiz Walks - ESW #369
![<p>(JHVEPhoto – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/7e/AdobeStock_644085520_Editorial_Use_Only.jpg.webp?itok=0rrvemB-)
2024. júl. 25.
Biztonsági szemle
NVIDIA patches flaw in Jetson software used in AI-powered systems
The high-severity vulnerability could enable denial of service, code execution and privilege escalation.
Oldalszámozás
- Előző oldal ‹‹
- 2. oldal
- Következő oldal ››