Biztonsági szemle

2025. Feb. 19.
Biztonsági szemle
Viable Defense Strategies Against Zero Days and Supply Chain Risks - Seamus Lennon - ZTW25 #1

2025. Feb. 19.
Biztonsági szemle
Australian Cybersecurity Trends and Predictions - Emile Barakat - ZTW25 #1

2025. Feb. 19.
Biztonsági szemle
Patch Now: CISA Warns of Palo Alto Flaw Exploited in the Wild
The authentication bypass vulnerability in the OS for the company's firewall devices is under increasing attack and being chained with other bugs, making it imperative for organizations to mitigate the issue ASAP.

2025. Feb. 19.
Biztonsági szemle
South Korea alleges DeepSeek of user data sharing with ByteDance
While a connection between DeepSeek and ByteDance has been established, the extent of transferred data remains uncertain, said the PIPC to South Korea's Yonhap News Agency. Such a development comes more than a week after a Security Scorecard report...

2025. Feb. 19.
Biztonsági szemle
Data breach notifications commenced by Finastra
Infiltration of an internal secure file platform between Oct. 31 and Nov. 8 enabled the threat actor to pilfer a limited number of individuals' names and financial account details, said Finastra in its notification letter given to the Massachusetts...

2025. Feb. 19.
Biztonsági szemle
Insight Partners impacted by social engineering attack
Insight Partners disclosed immediately acting to contain and remediate the breach of some of its systems upon its discovery on Jan. 16, adding that an investigation has revealed no evidence suggesting persistent access to the impacted systems while...

2025. Feb. 19.
Biztonsági szemle
Cyber incident compromises Lee Enterprises files, apps
Aside from impacting printed publication distribution, such an intrusion — which was not acknowledged as a ransomware attack — also interrupted billing, collections, and vendor payments, while temporarily limiting online operations, according to Lee...

2025. Feb. 19.
Biztonsági szemle
Novel FrigidStealer macOS malware spread via bogus browser updates
TA2727's attack campaign, which were discovered in late January, entailed the insertion of malicious "Update" buttons on legitimate websites, which when clicked trigger automated DMG file downloads and the evasion of macOS Gatekeeper to eventually...

2025. Feb. 19.
Biztonsági szemle
More advanced Snake Keylogger variant emerges
Despite featuring the same keystroke logging, screenshot capturing, and clipboard data gathering capabilities as earlier versions, such novel Snake Keylogger variant leverages an AutoIT-compiled binary as an executable file, which allows more...

2025. Feb. 19.
Biztonsági szemle
BlackLock ransomware on the rise, report finds
Attacks conducted by BlackLock, which could be this year's most active ransomware group, involve the distribution of proprietary malware against Windows, VMware ESXi, and Linux systems for double extortion, an analysis from Reliaquest revealed.

2025. Feb. 19.
Biztonsági szemle
What Is the Board's Role in Cyber-Risk Management in OT Environments?
By taking several proactive steps, boards can improve their organization's resilience against cyberattacks and protect their critical OT assets.
Oldalszámozás
- Előző oldal ‹‹
- 185. oldal
- Következő oldal ››