Biztonsági szemle
2025. Dec. 19.
Biztonsági szemle
A Good Year for North Korean Cybercriminals
North Korea shifted its strategy to patiently target "bigger fish" for larger payouts, using sophisticated methods to execute attacks at opportune times.
2025. Dec. 18.
Biztonsági szemle
SonicWall Edge Access Devices Hit by Zero-Day Attacks
In the latest attacks against the vendor's SMA1000 devices, threat actors have chained a new zero-day flaw with a critical vulnerability disclosed earlier this year.
2025. Dec. 18.
Biztonsági szemle
Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms
Dark Reading Confidential Episode 13: Developers are exposing their organizations' most sensitive information; our guests explain why it's happening and how to stop it.
2025. Dec. 18.
Biztonsági szemle
Dormant Iran APT is Still Alive, Spying on Dissidents
"Prince of Persia" has rewritten the rules of persistence with advanced operational security and cryptographic communication with its command-and-control server.
2025. Dec. 17.
Biztonsági szemle
Critical Fortinet Flaws Under Active Attack
Attackers targeted admin accounts, and once authenticated, exported device configurations including hashed credentials and other sensitive information.
2025. Dec. 17.
Biztonsági szemle
In Cybersecurity, Claude Leaves Other LLMs in the Dust
Anthropic proves that LLMs can be fairly resistant to abuse. Most developers are either incapable of building safer tools, or unwilling to invest in doing so.
2025. Dec. 17.
Biztonsági szemle
'Cellik' Android RAT Leverages Google Play Store
The remote access Trojan lets an attacker remotely control a victim's phone and can generate malicious apps from inside the Play Store.
2025. Dec. 17.
Biztonsági szemle
Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity
The future of cybersecurity means defending everywhere. Securing IoT, cloud, and remote work requires a unified edge-to-cloud strategy. (First in a three-part series.)
2025. Dec. 17.
Biztonsági szemle
The Future of Quantum-Safe Networks Depends on Interoperable Standards
As quantum computing advances, secure, interoperable standards will be critical to making quantum key distribution (QKD) practical, trusted, and future-proof.
2025. Dec. 17.
Biztonsági szemle
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customer environments.
2025. Dec. 17.
Biztonsági szemle
"Fake Proof" and AI Slop Hobble Defenders
In the React2Shell saga, non-working and trivial proof-of-concept exploits led to confusion and perhaps a false sense of security. Can the onslaught of PoCs be tamed?
2025. Dec. 17.
Biztonsági szemle
Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation
Rapid digitization, uneven cybersecurity know-how, and growing cybercriminal syndicates in the region have challenged law enforcement and prosecutors.
Oldalszámozás
- Előző oldal ‹‹
- 21. oldal
- Következő oldal ››