Biztonsági szemle
![Distributed cloud firewalls](/sites/default/files/styles/narrow_1x/public/feeds/7d/RodSCol-e1689694125896.jpg.webp?itok=XfhhgCJ6)
2024. feb. 27.
Biztonsági szemle
Patches issued for Zyxel firewall product vulnerabilities
Threat actors could leverage the null pointer deference flaw in Zyxel firewall products to facilitate denial-of-service conditions in vulnerable firewalls with activated "Anti-Malware" functionality.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
2024. feb. 27.
Biztonsági szemle
Energy Department seeks to advance energy cybersecurity with $45M investment
The U.S. Department of Energy has introduced a new $45 million cybersecurity research grant aimed at strengthening the energy industry against increasingly prevalent and sophisticated cybersecurity threats.
![](/sites/default/files/styles/narrow_1x/public/feeds/75/SecureCoding.jpg.webp?itok=8Ol6oKJv)
2024. feb. 27.
Biztonsági szemle
Memory-safe programming languages pushed by Biden administration
The Office of the National Cyber Director is urging a shift to memory-safe programming languages, such as Java, Rust, and Python.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
2024. feb. 27.
Biztonsági szemle
Study: Ransom payment not a shield against future attacks
More than 47% of those that paid ransoms were able to recover data and services without any issues, according to a report from Cybereason.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
2024. feb. 27.
Biztonsági szemle
Canadian police force cyberattack under probe
Investigation is already being conducted into the "alarming" cyberattack against the Royal Canadian Mounted Police's network on Feb. 23.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
2024. feb. 27.
Biztonsági szemle
California cities in same county subjected to separate cyberattacks
Ransomware has impacted the City of Oakley, prompting a state of emergency declaration even though no emergency services have been affected.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
2024. feb. 27.
Biztonsági szemle
Cyberattack hits ThyssenKrupp's automotive division
ThyssenKrupp had its Automotive Body Solutions business unit subjected to a cyberattack last week.
![](/sites/default/files/styles/narrow_1x/public/feeds/12/fallback-image.png.webp?itok=FMe-v7qn)
2024. feb. 27.
Biztonsági szemle
ALPHV/BlackCat reportedly behind Change Healthcare hack
ALPHV/BlackCat ransomware operation allegedly targeted major U.S. healthcare revenue and payment cycle management provider Change Healthcare.
![](/sites/default/files/styles/narrow_1x/public/feeds/18/010924_cloud_computing-e1709041463979.jpg.webp?itok=qsozt5rP)
2024. feb. 27.
Biztonsági szemle
New APT29 attacks set sights on cloud services
Cloud environments are being compromised by APT29 not only through previously breached access service account credentials but also via old employee accounts that were not disconnected by organizations.
![New SEC Rules](/sites/default/files/styles/narrow_1x/public/feeds/10/MikeBrittonColLATEFEB.jpg.webp?itok=7EHdaqIS)
2024. feb. 27.
Biztonsági szemle
The New SEC Rules: Why companies err on the side of filing
Companies may file early now, but the filings are mostly generic – striking a balance between early filing and thorough incident reporting remains challenging.
![](/sites/default/files/styles/narrow_1x/public/feeds/f3/layered-security-approach.jpg.webp?itok=5H9dfTzt)
2024. feb. 27.
Biztonsági szemle
What it takes to implement an effective threat intelligence program
Cyber threat intelligence demands smart planning and support from key stakeholders. Here are the top priorities, according to IT security professionals.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. feb. 27.
Biztonsági szemle
Microsoft boosts its Microsoft 365 Insider Builds on Windows Bounty Program with higher awards and an expanded scope
Starting today, we are doubling the maximum bounty award for the Microsoft 365 Insider Bug Bounty Program to $30,000 USD for high impact scenarios, such as unauthenticated non-sandboxed code execution with no user interaction. We are also expanding...
Oldalszámozás
- Előző oldal ‹‹
- 220. oldal
- Következő oldal ››