Biztonsági szemle
2025. Szep. 2.
Biztonsági szemle
Amazon Stymies APT29 Credential Theft Campaign
A group linked to Russian intelligence services redirected victims to fake Cloudflare verification pages and exploited Microsoft's device code authentication flow.
2025. Szep. 2.
Biztonsági szemle
WordPress Woes Continue Amid ClickFix Attacks, TDS Threats
Vulnerable and malicious plug-ins are giving threat actors the ability to compromise WordPress sites and use them as a springboard to a variety of cyber threats and scams.
2025. Szep. 2.
Biztonsági szemle
Zscaler, Palo Alto Networks Breached via Salesloft Drift
Two major security firms suffered downstream compromises as part of a large-scale supply chain attack involving Salesloft Drift, a marketing SaaS application.
2025. Szep. 2.
Biztonsági szemle
Jaguar Land Rover Shuts Down in Scramble to Secure 'Cyber Incident'
The luxury automaker said its retail and production activities have been "severely disrupted."
2025. Szep. 2.
Biztonsági szemle
Hackers Are Sophisticated & Impatient — That Can Be Good
You can't negotiate with hackers from a place of fear — but you can turn their urgency against them with the right playbook, people, and preparation.
2025. Szep. 2.
Biztonsági szemle
NIST Enhances Security Controls for Improved Patching
The US National Institute of Standards and Technology released Security and Privacy Control version 5.2.0 to help organizations be more proactive regarding patching.
2025. Szep. 2.
Biztonsági szemle
JSON Config File Leaks Azure ActiveDirectory Credentials
In this type of misconfiguration, cyberattackers could use exposed secrets to authenticate directly via Microsoft’s OAuth 2.0 endpoints and infiltrate Azure cloud environments.
2025. Aug. 29.
Biztonsági szemle
An Audit Isn't a Speed Bump — It's Your Cloud Co-Pilot
Auditing must be seen for what it truly can be: a multiplier of trust, not a bottleneck of progress.
2025. Aug. 29.
Biztonsági szemle
Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
Generating exploits with AI and large language models shrinks the time to target software flaws, giving security teams scant time to patch. Can enterprises adapt?
2025. Aug. 28.
Biztonsági szemle
CISA, FBI, NSA Warn of Chinese 'Global Espionage System'
Three federal agencies were parties to a global security advisory this week warning about the extensive threat posed by Chinese nation-state actors targeting network devices.
2025. Aug. 28.
Biztonsági szemle
Hackers Steal 4M+ TransUnion Customers' Data
The credit reporting agency said the breach was "limited to specific data elements" and didn't include credit reports or core credit information.
2025. Aug. 28.
Biztonsági szemle
Akira, Cl0p Top List of 5 Most Active Ransomware-as-a-Service Groups
Flashpoint published its 2025 midyear ransomware report that highlighted the top five most prolific groups currently in operation.
Oldalszámozás
- Előző oldal ‹‹
- 23. oldal
- Következő oldal ››