Biztonsági szemle
![Cloud technology and Data storage concept, Concept of Exchange information and data with internet cloud technology. FTP(File Transfer Protocol) files receiver.](/sites/default/files/styles/narrow_1x/public/feeds/c8/041024_file_transfer.jpg.webp?itok=Nps6mYF3)
2024. ápr. 10.
Biztonsági szemle
Raspberry Robin observed spreading via Windows Script Files
The HP Threat Research team says security pros should take note because Raspberry Robin has been used to deliver multiple families of malware – and as a precursor to ransomware.
![](/sites/default/files/styles/narrow_1x/public/feeds/99/040524_ai_chip_brain.jpg.webp?itok=84vwnLAj)
2024. ápr. 10.
Biztonsági szemle
Improved cyber resilience sought by new Darktrace AI-based security platform
Major artificial intelligence cybersecurity firm Darktrace has been looking to advance proactive cybersecurity resilience with its new ActiveAI Security Platform, which integrates new services with existing security offerings to provide improved...
![Magnified view of the Google Cloud logo on a computer screen](/sites/default/files/styles/narrow_1x/public/feeds/66/041024_google_cloud.jpg.webp?itok=0suBGCKH)
2024. ápr. 10.
Biztonsági szemle
Intelligence data hosting authorizations given to Google
FedScoop reports that Google has been granted federal authorizations to allow intelligence and defense data hosting through its air-gapped Google Distributed Cloud Hosted platform.
![<p>Credit: U.S. Cyber Command</p>](/sites/default/files/styles/narrow_1x/public/feeds/d9/us-cyber-command.jpg.webp?itok=SbYgb3zT)
2024. ápr. 10.
Biztonsági szemle
Haugh gives insights on Cybercom 2.0
Both the U.S. Cyber Command and the newly established Assistant Secretary of Defense for Cyber Policy office were noted by Cyber Command and National Security Agency head Gen. Timothy Haugh to be closely collaborating to advance the Defense...
![Russia flag is depicted on the screen with the program code. The concept of modern technology and site development.](/sites/default/files/styles/narrow_1x/public/feeds/c7/011924_russia_flag.jpg.webp?itok=_7DmXwyD)
2024. ápr. 10.
Biztonsági szemle
Russian businesses targeted by novel ransomware gang
Attacks with a Conti ransomware code-based backdoor have been deployed by the new Muliaka ransomware operation against businesses across Russia since at least December, according to The Record, a news site by cybersecurity firm Recorded Future.
![Chinese hacker. Laptop with binary computer code and china flag](/sites/default/files/styles/narrow_1x/public/feeds/df/031924_china_flag.jpg.webp?itok=2CIBVinP)
2024. ápr. 10.
Biztonsági szemle
AI tapped by Chinese state-backed hackers for foreign election interference
More Chinese state-sponsored threat operations have been leveraging artificial intelligence to power disinformation campaigns targeted at the recently concluded elections in Taiwan and the upcoming U.S. presidential polls, according to CyberScoop.
![cloud_AdobeStock_529882524](/sites/default/files/styles/narrow_1x/public/feeds/c1/AdobeStock_529882524.jpg.webp?itok=1bVjHKvN)
2024. ápr. 10.
Biztonsági szemle
Funding round secures $300M for Cyera
Major data security solutions provider Cyera has landed $300 million from a Series C investment round, bringing total funds raised to $460 million, at a valuation of $1.4 billion, according to SecurityWeek.
![A computer screen with Javascript is seen](/sites/default/files/styles/narrow_1x/public/feeds/35/011824_javascript.jpg.webp?itok=CC9kWIrE)
2024. ápr. 10.
Biztonsági szemle
Software supply chain risk mitigation sought by new Synopsys solution
Mounting software supply chain attacks have prompted Synopsys to introduce the new Black Duck Supply Chain Edition software composition analysis solution, reports SiliconAngle.
![The United States Capitol building is seen at sunrise in Washington](/sites/default/files/styles/narrow_1x/public/feeds/d6/041024_us_capitol.jpg.webp?itok=_U4MQ9Km)
2024. ápr. 10.
Biztonsági szemle
EPA: Publicly available information part of data leak
The U.S. Environmental Protection Agency has disclosed that data leaked by threat actor USDoD on BreachForums over the weekend involved information that had already been made available to the public as part of the agency's efforts to provide "a...
![Malicious computer programming code in the shape of a skull.](/sites/default/files/styles/narrow_1x/public/feeds/d4/040424_ransomware.jpg.webp?itok=KPpI71mi)
2024. ápr. 10.
Biztonsági szemle
Ransomware attack disrupts GBI Genios
Operations at major German database provider GBI Genios have been interrupted by a ransomware attack against its servers, which is expected to result in a days-long outage, according to The Record, a news site by cybersecurity firm Recorded Future.
![Unknown vectors haunts ransomware plauybook](/sites/default/files/styles/narrow_1x/public/feeds/0c/040924_email.jpg.webp?itok=Rw_ZwFFI)
2024. ápr. 10.
Biztonsági szemle
How BEC attacks are evolving in the AI era
Here are three new BEC tactics CISOs need to watch for.
![<p>(Credit: JHVEPhoto – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/2c/AdobeStock_439673330_Editorial_Use_Only.jpg.webp?itok=gxLxGpXJ)
2024. ápr. 9.
Biztonsági szemle
D-Link NAS device vulnerabilities exploited – no patch available
An attacker could gain remote access to network-attached storage and execute arbitrary commands.
Oldalszámozás
- Előző oldal ‹‹
- 170. oldal
- Következő oldal ››