Biztonsági szemle
2025. Okt. 2.
Biztonsági szemle
Red Hat Investigates Widespread Breach of Private GitLab Repositories
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
2025. Okt. 2.
Biztonsági szemle
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.
2025. Okt. 2.
Biztonsági szemle
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
2025. Okt. 2.
Biztonsági szemle
Android Spyware in the UAE Masquerades as ... Spyware
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.
2025. Okt. 1.
Biztonsági szemle
Google Sheds Light on ShinyHunters' Salesforce Tactics
Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.
2025. Okt. 1.
Biztonsági szemle
Shutdown Threatens US Intel Sharing, Cyber Defense
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.
2025. Okt. 1.
Biztonsági szemle
A $50 'Battering RAM' Can Bust Confidential Computing
Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.
2025. Okt. 1.
Biztonsági szemle
Undead Operating Systems Haunt Enterprise Security Networks
Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.
2025. Okt. 1.
Biztonsági szemle
China Imposes One-Hour Reporting Rule for Major Cyber Incidents
The sweeping new regulations show that China's serious about hardening its own networks after launching widespread attacks on global networks.
2025. Szep. 30.
Biztonsági szemle
New China APT Strikes With Precision and Persistence
Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.
2025. Szep. 30.
Biztonsági szemle
'Klopatra' Trojan Makes Bank Transfers While You Sleep
A sophisticated new banking malware is hard to detect, capable of stealing lots of money, and infecting thousands of people in Italy and Spain.
2025. Szep. 30.
Biztonsági szemle
China Exploited New VMware Bug for Nearly a Year
A seemingly benign privilege-escalation process in VMware and other software has likely benefited attackers and other malware strains for years, researchers noted.
Oldalszámozás
- Előző oldal ‹‹
- 26. oldal
- Következő oldal ››