Biztonsági szemle
2025. április 17.
Biztonsági szemle
Enterprise mobile apps riddled with sloppy data security
Nearly 9 in 10 apps tested by Zimperium used encryption that did not adhere to best practices.
2025. április 16.
Biztonsági szemle
Interlock ransomware evolves tactics with ClickFix, infostealers
The lesserknown ransomware group uses fake updaters on compromised sites to lure victims.
2025. április 16.
Biztonsági szemle
Multiple Groups Exploit NTLM Flaw in Microsoft Windows
The attacks have been going on since shortly after Microsoft patched the vulnerability in March.
2025. április 16.
Biztonsági szemle
China-Linked Hackers Lay Brickstorm Backdoors on Euro Networks
Researchers discovered new variants of the malware, which is tied to a China-nexus threat group, targeting Windows environments of critical infrastructure networks in Europe.
2025. április 16.
Biztonsági szemle
Ransomware gang 'CrazyHunter' Targets Critical Taiwanese Orgs
Trend Micro researchers detailed an emerging ransomware campaign by a new group known as "CrazyHunter" that is targeting critical sectors in Taiwan.
2025. április 16.
Biztonsági szemle
NIST Updates Privacy Framework With AI and Governance Revisions
Changes aim to tighten integration with the National Institute of Standards and Technology's Cybersecurity Framework and help organizations develop a stronger posture to handle privacy risks.
2025. április 16.
Biztonsági szemle
Patch Now: NVDIA Flaws Expose AI Models, Critical Infrastructure
A fix for a critical flaw in a tool allowing organizations to run GPU-accelerated containers released last year did not fully mitigate the issue, spurring the need to patch a secondary flaw to protect organizations that rely on NVIDIA processors for...
2025. április 16.
Biztonsági szemle
Data interchange: A critical look at government efficiency and the Elon Musk effect
Optimization and efficiency must not come at the expense of People’s data (lives).
2025. április 16.
Biztonsági szemle
Developers in the crosshairs of notorious DPRK crew 'Slow Pisces'
North Korea-linked group targets developers with job offers that lead to poisoned coding challenges.
2025. április 16.
Biztonsági szemle
Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data
Cloud misconfigurations and cryptography flaws plague some of the top apps used in work environments, exposing organizations to risk and intrusion.
2025. április 16.
Biztonsági szemle
Active Directory Recovery Can't Be an Afterthought
Active Directory is one of the most vulnerable access points in an organization's IT environment. Companies cannot wait for a real attack to pressure-test their AD recovery strategy.
2025. április 16.
Biztonsági szemle
CISA funds CVE program in the 11th hour of contract with MITRE
Foundation to support CVE Program formally announced amid news that program was saved.
Oldalszámozás
- Előző oldal ‹‹
- 204. oldal
- Következő oldal ››