Biztonsági szemle
![Internet of Things (IoT)](/sites/default/files/styles/narrow_1x/public/feeds/68/050124_internet_of_things.jpg.webp?itok=icD3tRc1)
2024. máj. 1.
Biztonsági szemle
UK cracks down on default passwords for smart devices
The UK has become the first country worldwide to prohibit Internet of Things device manufacturers from using default usernames and passwords in their products following the approval of the Product Security and Telecommunications Infrastructure act...
![](/sites/default/files/styles/narrow_1x/public/feeds/a8/Merger_Cagkan_Sayin_Alamy.jpg.webp?itok=O3K6Sk7C)
2024. máj. 1.
Biztonsági szemle
The Cybersecurity Checklist That Could Save Your M&A Deal
With mergers and acquisitions making a comeback, organizations need to be sure they safeguard their digital assets before, during, and after.
![The United States Capitol building is seen at sunrise in Washington](/sites/default/files/styles/narrow_1x/public/feeds/d6/041024_us_capitol.jpg.webp?itok=_U4MQ9Km)
2024. máj. 1.
Biztonsági szemle
FTC urged to probe automakers' location data sharing practices
The Federal Trade Commission has been sought by Sens. Ron Wyden, D-Ore., and Ed Markey, D-Mass., to launch an investigation into major automakers' driver location data sharing practices after a congressional probe showed that only five of 14 car...
![Microsoft logo at the company office building located in Munich, Germany](/sites/default/files/styles/narrow_1x/public/feeds/df/011024_microsoft_logo.jpg.webp?itok=6Co0llBu)
2024. máj. 1.
Biztonsági szemle
Microsoft vulnerability prevalence slightly declines
Microsoft recorded 1,228 security vulnerabilities in 2023, representing a 5% decline from the year prior and the steady prevalence of reported security issues since 2020, TechRepublic reports.
![<p>(“Coding Javascript” by Christiaan Colen is licensed under CC BY-SA 2.0)</p>](/sites/default/files/styles/narrow_1x/public/feeds/70/20447259789_e823ae6656_k.jpg.webp?itok=I5cFz7hG)
2024. máj. 1.
Biztonsági szemle
Host takeovers likely with critical Judge0 flaws
SecurityWeek reports that online open-source service Judge0 used for arbitrary code execution within a sandbox has been impacted by three critical vulnerabilities, which could be leveraged to facilitate sandbox escapes, privilege escalation, and...
![Ransomware attack](/sites/default/files/styles/narrow_1x/public/feeds/84/0926_ransomware.jpg.webp?itok=hK1UAKBN)
2024. máj. 1.
Biztonsági szemle
Philadelphia Inquirer breach impacts over 25K
The Philadelphia Inquirer has confirmed that 25,549 individuals had their personal and financial details exfiltrated following a cyberattack last May, according to BleepingComputer.
![The JPMorgan logo is displayed on a smartphone screen and in the background](/sites/default/files/styles/narrow_1x/public/feeds/95/0501_jpmorgan.jpg.webp?itok=H80g1YMQ)
2024. máj. 1.
Biztonsági szemle
More than 450K hit by JPMorgan breach
Major U.S. multinational financial services firm JPMorgan had information from more than 450,000 of its customers compromised following a data breach in August 2021, reports Cybernews.
![Stickers, buttons and pencils with the WordPress logo are seen in a pile.](/sites/default/files/styles/narrow_1x/public/feeds/15/071522_wordpress.jpg.webp?itok=DP8ZSyJa)
2024. máj. 1.
Biztonsági szemle
Novel Wpeeper Android malware examined
BleepingComputer reports that hacked WordPress sites have been used as relay command-and-control servers by the novel Wpeeper Android malware, which has been spread via a pair of app stores impersonating the Uptodown App Store and is believed to have...
![Microsoft Azure logo](/sites/default/files/styles/narrow_1x/public/feeds/7c/033123_microsoft_azure.jpg.webp?itok=jPM3nYyE)
2024. máj. 1.
Biztonsági szemle
Microsoft Azure, Cloudflare lures leveraged to spread Latrodectus malware downloader
Threat actors have leveraged Microsoft Azure and Cloudflare lures to facilitate phishing campaigns deploying the Latrodectus malware downloader, also known as IceNova and Unidentified 111, BleepingComputer reports.
![The Docker website is displayed on a computer.](/sites/default/files/styles/narrow_1x/public/feeds/86/022423_docker_hub.jpg.webp?itok=6rf54yXa)
2024. máj. 1.
Biztonsági szemle
Malicious repositories proliferate in Docker Hub
More than three million of 4.79 imageless repositories uploaded to Docker Hub over the past five years have been leveraged to target the container registry's users in three separate malicious campaigns, reports The Hacker News.
![](/sites/default/files/styles/narrow_1x/public/feeds/23/brains-VincentDrago-alamy.jpg.webp?itok=94dYTPjk)
2024. máj. 1.
Biztonsági szemle
Verizon DBIR: Basic Security Gaffes Underpin Bumper Crop of Breaches
MOVEit drove a big chunk of the increase, but human vulnerability to social engineering and failure to patch known bugs led to a doubling of breaches since 2023, said Verizon Business.
![](/sites/default/files/styles/narrow_1x/public/feeds/fc/Privacy_Skorzewiak_Alamy.jpg.webp?itok=Wk2owaJp)
2024. máj. 1.
Biztonsági szemle
Facebook at 20: Contemplating the Cost of Privacy
As the social media giant celebrates its two-decade anniversary, privacy experts reflect on how it changed the way the world shares information.
Oldalszámozás
- Előző oldal ‹‹
- 138. oldal
- Következő oldal ››