Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/dc/LLM_Bakhtiar_Zein_Alamy.jpg.webp?itok=HKq7p-ok)
2024. ápr. 23.
Biztonsági szemle
Lessons for CISOs From OWASP's LLM Top 10
It's time to start regulating LLMs to ensure they're accurately trained and ready to handle business deals that could affect the bottom line.
![](/sites/default/files/styles/narrow_1x/public/feeds/75/ransomware-data.jpg.webp?itok=zYXT29Gq)
2024. ápr. 23.
Biztonsági szemle
Post-ransomware disruptions continue at California county library system
Operations of California's Solano Partner Libraries and St. Helena, or SPLASH, continue to be interrupted weeks after the county's library network was targeted by a ransomware attack earlier this month, StateScoop reports.
![Microsoft March Patch Tuesday roundup](/sites/default/files/styles/narrow_1x/public/feeds/5c/Windows-logo-textured.jpg.webp?itok=aetwsjTc)
2024. ápr. 23.
Biztonsági szemle
Rootkit capabilities likely with Windows bugs
Several rootkit-like capabilities could be obtained by threat actors through the exploitation of vulnerabilities in Windows' DOS-to-NT path conversion process, including file and process concealment and compromised prefetch file analysis, reports The...
![Russia flag is depicted on the screen with the program code. The concept of modern technology and site development.](/sites/default/files/styles/narrow_1x/public/feeds/c7/011924_russia_flag.jpg.webp?itok=_7DmXwyD)
2024. ápr. 23.
Biztonsági szemle
Ukraine critical infrastructure subjected to Sandworm attacks
Nearly 20 water, energy, and heating providers across Ukraine were noted by the country's Computer Emergency Response Team to have their information and communications systems targeted by Russian state-backed advanced persistent threat operation...
![GitHub symbol](/sites/default/files/styles/narrow_1x/public/feeds/1a/0623_github.jpg.webp?itok=F1pKMy2W)
2024. ápr. 23.
Biztonsági szemle
Abusing GitHub flaw could compromise GitLab
Open-source DevOps software project GitLab has also been impacted by the same security issue in GitHub comments that has been exploited by threat actors through Microsoft repository-linked URLs to facilitate the distribution of malware that was made...
![](/sites/default/files/styles/narrow_1x/public/feeds/bb/spyware_Robert_Brown_Alamy.jpg.webp?itok=4yFYfOZY)
2024. ápr. 23.
Biztonsági szemle
US Gov Slaps Visa Restrictions on Spyware Honchos
The State Department can now deny entrance to the US for individuals accused of profiting from spyware-related human rights abuses, and their immediate family members.
![](/sites/default/files/styles/narrow_1x/public/feeds/f1/RussianHacking_SciencePhotoLibrary-AlamyStock.jpg.webp?itok=Nz3-gQWl)
2024. ápr. 23.
Biztonsági szemle
Russia's Fancy Bear Pummels Windows Print Spooler Bug
The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.
![](/sites/default/files/styles/narrow_1x/public/feeds/69/vpn_Wright_Studio_shutterstock.jpg.webp?itok=wc9Uq3vH)
2024. ápr. 23.
Biztonsági szemle
Teetering on the Edge: VPNs, Firewalls' Nonexistent Telemetry Lures APTs
State-sponsored groups are targeting critical vulnerabilities in virtual private network (VPN) gateways, firewall appliances, and other edge devices to make life difficult for incident responders, who rarely have visibility into the devices.
![Amazon Rainforest](/sites/default/files/styles/narrow_1x/public/feeds/86/042224_rainforest.jpg.webp?itok=DbJs6YmQ)
2024. ápr. 23.
Biztonsági szemle
Navigating the ethical frontiers of our digital ecosystem
Security pros must always remember that we are custodians of the digital realm and it’s our job to keep people safe.
![](/sites/default/files/styles/narrow_1x/public/feeds/2a/kualalumpurcity_rudi1976_Alamy_Stock_Photo.jpeg.webp?itok=U31dhkDk)
2024. ápr. 23.
Biztonsági szemle
Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros
Malaysia, Singapore, and Ghana are among the first countries to pass laws that require cybersecurity firms — and in some cases, individual consultants — to obtain licenses to do business, but concerns remain.
![](/sites/default/files/styles/narrow_1x/public/feeds/36/toddycat-RooM_the_Agency-Alamy.jpg.webp?itok=iNZRKSmr)
2024. ápr. 22.
Biztonsági szemle
ToddyCat APT Is Stealing Data on 'Industrial Scale'
The threat actor is deploying multiple connections into victim environments to maintain persistence and steal data.
![American cash banknotes money](/sites/default/files/styles/narrow_1x/public/feeds/81/030323_cash_money.jpg.webp?itok=d_CNwBEV)
2024. ápr. 22.
Biztonsági szemle
Bogged down by SIEM data ingest fees? 3 strategies to keep costs in check
Solutions exist that let organizations adjust the volume of data being processed by their SIEM system.
Oldalszámozás
- Előző oldal ‹‹
- 153. oldal
- Következő oldal ››