Biztonsági szemle
![handcuffs sit on the keyboard of a laptop. cybercrime](/sites/default/files/styles/narrow_1x/public/feeds/86/032124_laptop_handcuffs.jpg.webp?itok=MQyJuEt0)
2024. máj. 17.
Biztonsági szemle
Arrests made in North Korean remote job scam targeting US firms
U.S. prosecutors announced the arrests of an American woman and a Ukrainian man for aiding North Korean IT workers posing as Americans to secure remote jobs at over 300 U.S. companies, Reuters reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/89/Dany_Kurniawan-cyber-stockmarket-shutterstock.jpg.webp?itok=1wIjRP-j)
2024. máj. 17.
Biztonsági szemle
CISOs and Their Companies Struggle to Comply With SEC Disclosure Rules
Most companies still can't determine whether a breach is material within the four days mandated by the SEC, skewing incident response.
![](/sites/default/files/styles/narrow_1x/public/feeds/16/Data%281800%29_marcos_alvarado_Alamy.jpg.webp?itok=onJyKJot)
2024. máj. 17.
Biztonsági szemle
Whose Data Is It Anyway? Equitable Access in Cybersecurity
Cybersecurity cannot be solely about defending against threats; it must also empower organizations with their data.
![Closeup of an American "I voted" sticker placed on a navy shirt.](/sites/default/files/styles/narrow_1x/public/feeds/9f/051726_vote_sticker.jpg.webp?itok=rE2msZ35)
2024. máj. 17.
Biztonsági szemle
Cybersecurity summit at Google tackles election threats
Cybersecurity experts convened at Google's Boulder, Colorado, campus to address election threats, particularly the challenges posed by advanced technologies like deepfakes, CBS News reports.
![AI, Artificial Intelligence](/sites/default/files/styles/narrow_1x/public/feeds/9a/0608_artificial_intelligence.jpg.webp?itok=v71DLEsH)
2024. máj. 17.
Biztonsági szemle
Researchers: 'Adversarial attacks' capable of producing harmful AI responses
A study by Amazon Web Services researchers has revealed critical security vulnerabilities in large language models that understand and respond to speech, which could allow them to be manipulated into generating harmful responses using sophisticated...
![Wireless network and connection abstract data background with wifi symbol](/sites/default/files/styles/narrow_1x/public/feeds/06/051724_wifi.jpg.webp?itok=Ii3tKFhY)
2024. máj. 17.
Biztonsági szemle
Downgrade attacks enabled by newly discovered Wi-Fi flaw
Security researchers have identified a design flaw in the IEEE 802.11 Wi-Fi standard that could allow malicious actors to trick users into connecting to less secure networks, The Hacker News reports.
![key on monitor screen, cybersecurity concept](/sites/default/files/styles/narrow_1x/public/feeds/a0/051324_ransomware.jpg.webp?itok=OF7mf0mg)
2024. máj. 17.
Biztonsági szemle
Report: Cat-phishing of legitimate websites on the rise
HP's latest Wolf Security Threat Insights Report reveals that cybercriminals are employing "cat-phishing" techniques to deceive victims and using overdue invoice lures and Living-off-the-Land tactics to bypass security defenses, reports SiliconAngle.
![Computer keyboard, close-up button of the flag of North Korea.](/sites/default/files/styles/narrow_1x/public/feeds/6b/1127_north_korea-e1704488987937.jpg.webp?itok=fXobV-Uh)
2024. máj. 17.
Biztonsági szemle
Human rights activists targeted in Kimsuky malware campaign
The North Korea-linked Kimsuky hacking group has launched a new social engineering campaign targeting activists in the North Korean human rights and anti-North Korea sectors, The Hacker News reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/e3/microsoft_MAXSHOT.PL_shutterstock.jpg.webp?itok=hGDFzEi-)
2024. máj. 17.
Biztonsági szemle
Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.
![10 software supply chain security tips](/sites/default/files/styles/narrow_1x/public/feeds/1b/051624_programming_code.jpg.webp?itok=U48cYQjP)
2024. máj. 17.
Biztonsági szemle
Ten ways to minimize software supply chain risks
Organizations must make software supply chain security a collaborative effort where everyone on the development team gets involved.
![<p>Island’s Mike Fey</p>](/sites/default/files/styles/narrow_1x/public/feeds/c6/051624_island_mike_fey.jpg.webp?itok=p9vxdLRj)
2024. máj. 17.
Biztonsági szemle
The enterprise browser: The first win-win-win for CISOs, CIOs and end users
Island's Mikey Fey on how enterprise browsers combine security and productivity.
![<p>Intezer’s Jim McDonough</p>](/sites/default/files/styles/narrow_1x/public/feeds/b7/051624_intezer_jim_mcdonough.jpg.webp?itok=-A4geVtS)
2024. máj. 17.
Biztonsági szemle
One big problem SOC teams can actually solve with AI
Intezer's Jim McDonough on what AI brings to the security table for SOC teams.
Oldalszámozás
- Előző oldal ‹‹
- 105. oldal
- Következő oldal ››