Biztonsági szemle
![Brain "AI" inside the chip logo representing ai tech.](/sites/default/files/styles/narrow_1x/public/feeds/91/032624_ai_chip.jpg.webp?itok=ZBIUc0Sv)
2024. ápr. 5.
Biztonsági szemle
AI expected to bolster corporate cybersecurity
Artificial intelligence is believed by 63% of IT and security professionals to be beneficial to their organizations' security posture, ZDNET reports.
![DDoS attack](/sites/default/files/styles/narrow_1x/public/feeds/bd/1030_ddos.jpg.webp?itok=SE0gk_M1)
2024. ápr. 5.
Biztonsági szemle
Potentially significant risk of novel DoS attack technique examined
Threat actors could leverage the novel HTTP/2 Continuation Flood denial-of-service attack technique to facilitate DDoS attacks more severe than record-breaking intrusions enabled by the Rapid Reset approach last year, according to SecurityWeek.
![Russia, Moscow, St. Basil's Cathedral on red square](/sites/default/files/styles/narrow_1x/public/feeds/67/040524_russia_red_square.jpg.webp?itok=eUaQW_nH)
2024. ápr. 5.
Biztonsági szemle
Extensive Russian criminal record leak conducted by hacktivist group
Russia had its prosecutor general's website claimed to be compromised by Russian-speaking hacktivist operation RGB-TEAM, which admitted stealing a trove of data, including an archive with 100,000 Russian criminal records between 1993 and 2022 that...
![Login. Username and Password on Computer Screen](/sites/default/files/styles/narrow_1x/public/feeds/6b/033023_password.jpg.webp?itok=cK8NPXEp)
2024. ápr. 5.
Biztonsági szemle
Over 4.4M impacted by SurveyLama breach
More than 4.4 million SurveyLama users had their data compromised following a breach impacting the French-owned survey rewards platform in February, SecurityWeek reports.
![A detailed view of a server rack, intricate network of cables ensuring internet connection](/sites/default/files/styles/narrow_1x/public/feeds/1e/013124_server_rack.jpg.webp?itok=pLzn_8oG)
2024. ápr. 5.
Biztonsági szemle
Cyberattack disrupts Hoya operations
Major Japanese global optical products manufacturer Hoya Corporation had operations of some production plants and its ordering system disrupted after a cyberattack against its servers on Mar. 30, according to BleepingComputer.
![A computer popup box screen warning of a system being hacked, compromised software environment.](/sites/default/files/styles/narrow_1x/public/feeds/b3/1024_ransomware.jpg.webp?itok=0i9ma8g8)
2024. ápr. 5.
Biztonsági szemle
Asia subjected to data exfiltration attacks by suspected Vietnamese hacking group
China, India, South Korea, Indonesia, Vietnam, Bangladesh, and Pakistan have been subjected to attacks by suspected Vietnamese threat operation CoralRaider, which involved the delivery of the QuasarRAT variant dubbed RotBot and the XClient...
![Malware analysis](/sites/default/files/styles/narrow_1x/public/feeds/f2/0816_malware.jpg.webp?itok=u1I2LnSP)
2024. ápr. 5.
Biztonsági szemle
Financial sector targeted by new JSOutProx RAT variant
BleepingComputer reports that phishing attacks with an updated JSOutProx remote access trojan variant have been deployed against financial entities in South and Southeast Asia, the Middle East, and Africa.
![Magnifying glass found the Russia map among computer binary code](/sites/default/files/styles/narrow_1x/public/feeds/ec/1208_russia.jpg.webp?itok=VCeqmYe0)
2024. ápr. 5.
Biztonsági szemle
Midnight Blizzard attack against Microsoft impacts US agencies
CyberScoop reports that U.S. federal agencies were reported to have received an emergency directive from the Cybersecurity and Infrastructure Security Agency regarding the impact of a Microsoft hack by Russian state-sponsored threat operation...
![The EU's DMA](/sites/default/files/styles/narrow_1x/public/feeds/53/040424_app_store.jpg.webp?itok=GxMevb6K)
2024. ápr. 5.
Biztonsági szemle
Can the EU’s Digital Markets Act end Apple and Google's app store dominance and deliver better mobile app security?
By breaking Apple and Google’s app store dominance, the EU’s Digital Markets Act can potentially launch a revolution in mobile app development and security.
![](/sites/default/files/styles/narrow_1x/public/feeds/75/ransomware-data.jpg.webp?itok=zYXT29Gq)
2024. ápr. 5.
Biztonsági szemle
Are ransomware attacks declining in 2024? Depends who you ask
Threat actors have claimed more than 900 attacks in Q1, but fewer than 200 have been confirmed.
![<p>Credit: Adobe Stock Images</p>](/sites/default/files/styles/narrow_1x/public/feeds/94/Cloud-Security_AdobeStockImages_cropped-scaled-e1719525720261.jpg.webp?itok=aEdn83Bb)
2024. ápr. 5.
Biztonsági szemle
How cloud migration impacts modern network security
Cloud computing improves scalability and may cut costs, but network-security practitioners may have difficulty adjusting. Here are some challenges and solutions of cloud-based network security.
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12775″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/91/ESW_356_seg_1_5589852f-6785-4c1b-8e42-f336c59dde6b.jpg.webp?itok=92Rg9vZF)
2024. ápr. 4.
Biztonsági szemle
Getting Vulnerability Management Back on the Rails - Patrick Garrity - ESW #356
Oldalszámozás
- Előző oldal ‹‹
- 174. oldal
- Következő oldal ››