Biztonsági szemle
![Close-up of a WiFi router](/sites/default/files/styles/narrow_1x/public/feeds/cd/022824_router.jpg.webp?itok=OP9zQmUe)
2024. máj. 2.
Biztonsági szemle
Enterprise SOHOs subjected to Cuttlefish malware attacks
Security Affairs reports that attacks with the novel Cuttlefish malware have been deployed against enterprise-grade small office/home office routers between October 2023 and April 2024 to facilitate the exfiltration of public cloud authentication...
![Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol. 3d rendering.](/sites/default/files/styles/narrow_1x/public/feeds/19/030323_ransomware.jpg.webp?itok=r_1YGoz0)
2024. máj. 2.
Biztonsági szemle
Increased stealth introduced in updated Zloader malware
Reemergent Zloader trojan has been updated once again by its operators to include an anti-analysis feature restricting binary execution to compromised machines, which is similar to one observed in exposed Zeus banking trojan 2.x source code...
![](/sites/default/files/styles/narrow_1x/public/feeds/48/GettyImages-1238219471-1.jpg.webp?itok=jIQWo8Tn)
2024. máj. 2.
Biztonsági szemle
CISA: Immediate GitLab account takeover flaw remediation crucial amid attacks
Ongoing intrusions targeting GitLab instances impacted by the maximum severity account takeover vulnerability, tracked as CVE-2023-7028, have prompted the flaw's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited...
![](/sites/default/files/styles/narrow_1x/public/feeds/d4/Tapati_Rinchumrus-email-security-shutterstock.jpg.webp?itok=nDtkFq2q)
2024. máj. 2.
Biztonsági szemle
Why Haven't You Set Up DMARC Yet?
DMARC adoption is more important than ever following Google's and Yahoo's latest mandates for large email senders. This Tech Tip outlines what needs to be done to enable DMARC on your domain.
![](/sites/default/files/styles/narrow_1x/public/feeds/72/microsoft_Robert_K_chin_Storefronts_Alamy.jpg.webp?itok=hMOHUKnc)
2024. máj. 2.
Biztonsági szemle
Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft
Weaponizing Microsoft's own services for command-and-control is simple and costless, and it helps attackers better avoid detection.
![](/sites/default/files/styles/narrow_1x/public/feeds/bd/Windmills_incamerastock_Alamy.jpg.webp?itok=PAjNWQRh)
2024. máj. 2.
Biztonsági szemle
'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving. Can Defenders Keep Up?
A recent campaign targeting Middle Eastern government organizations plays standard detection tools like a fiddle. With cyberattackers getting more creative, defenders must start keeping pace.
![<p>(Credit: Ascannio – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/7b/AdobeStock_397693217_Editorial_Use_Only.jpg.webp?itok=DNVdqReQ)
2024. máj. 2.
Biztonsági szemle
Verizon’s 2024 Data Breach Investigations Report: 5 key takeaways
Vulnerability exploits, pure extortion and internal risks are on the rise, while AI threats fall short.
![](/sites/default/files/styles/narrow_1x/public/feeds/d7/signpost-Mick_House-alamy.jpg.webp?itok=8BiLAlbg)
2024. máj. 2.
Biztonsági szemle
Private Internet Search Is Still Finding Its Way
The quest to keep data private while still being able to search may soon be within reach, with different companies charting their own paths.
![](/sites/default/files/styles/narrow_1x/public/feeds/09/thumbsdown-STANCA_SANDA-Alamy.jpg.webp?itok=dFVeM6pl)
2024. máj. 2.
Biztonsági szemle
UnitedHealth Congressional Testimony Reveals Rampant Security Fails
The breach was carried out with stolen Citrix credentials for an account that lacked multifactor authentication. Attackers went undetected for days, and Change's backup strategy failed.
![](/sites/default/files/styles/narrow_1x/public/feeds/d3/325351_DR23_Graphics_General_Large_Text_v1.png.webp?itok=t_2x_glb)
2024. máj. 1.
Biztonsági szemle
Cobalt's 2024 State of Pentesting Report Reveals Cybersecurity Industry Needs
![Code id tech finger safety verification concept scan background lock identity cyberspace control digital computer access system biometric security fingerprint technology identification scanner](/sites/default/files/styles/narrow_1x/public/feeds/9e/041124_fingerprint.jpg.webp?itok=B0DcqE-C)
2024. máj. 1.
Biztonsági szemle
Better identity threat detection sought by new Semperis ML-based tool
SiliconAngle reports that more robust high-risk identity threat discovery and response efforts are being aimed by enterprise identity protection startup Semperis with its new machine learning-based Lightning Identity Runtime Protection identity...
Oldalszámozás
- Előző oldal ‹‹
- 135. oldal
- Következő oldal ››