Biztonsági szemle
2025. Jan. 23.
Biztonsági szemle
Data recovery after fulfilling ransomware attack demands mostly unlikely
Only 7% of ransomware-hit organizations around the world were able to recover all their stolen data after paying the ransoms sought by their attackers.
2025. Jan. 23.
Biztonsági szemle
Increased cybersecurity cooperation forged by Russia, Iran
Russia and Iran have agreed to advance digital space regulations for international tech firms and share know-how on managing the internet, which was declared by human rights nonprofit Freedom House to be "not free" in both countries amid intense...
2025. Jan. 23.
Biztonsági szemle
User location data exposure threatened by Cloudflare CDN vulnerability
With Cloudflare conducting media resource caching at the data center closest in proximity to its users, security researcher Daniel discovered that an information-disclosure intrusion could be conducted through the delivery of a unique image hosted on...
2025. Jan. 23.
Biztonsági szemle
Widespread AIRASHI botnet detailed in new report
Aside from the zero-day, threat actors behind AIRASHI also leveraged more than a dozen other security flaws impacting AVTECH IP cameras, Shenzhen TVT appliances, and other devices dating as far back as 2013, a report from QiAnXin XLab researchers...
2025. Jan. 23.
Biztonsági szemle
Ivanti CSA exploit chains examined in joint CISA, FBI advisory
Attacks with the chained vulnerabilities have been thwarted by three organizations, with the first preventing compromise following sysadmin identification of suspicious user accounts and the second averting the breach after an endpoint protection...
2025. Jan. 23.
Biztonsági szemle
Malware deployed via new ClickFix attack variant using Silk Road founder as lure
Attackers who made fraudulent but verified Ross Ulbricht accounts on X, formerly Twitter, sought to lure users into joining Telegram channels purporting to be Ulbricht portals, which provided a walk through on the bogus Safeguard identity...
2025. Jan. 23.
Biztonsági szemle
New Chinese cyberespionage campaign targeted South Korean VPN service
Execution of a trojanized installer triggers deployment of a loader with another DLL eventually resulting in the running of SlowStepper, which supports commands enabling extensive system info theft, file deletion, Python module execution, and self...
2025. Jan. 23.
Biztonsági szemle
Doti AI Launches Platform to Securely Find Enterprise Data
The AI-powered work platform helps organizations securely identify and access internal enterprise data as part of business processes and workflows.
2025. Jan. 22.
Biztonsági szemle
Security Needs to Start Saying 'No' Again
The rush to say "yes" allows cybersecurity teams to avoid hard conversations with business stakeholders but also risks losing their ability to effectively protect organizations.
2025. Jan. 22.
Biztonsági szemle
Trump Overturns Biden Rules on AI Development, Security
The new administration moved quickly to remove any constraints on AI development and collected $500 billion in investment pledges for an American-owned AI joint venture.
2025. Jan. 22.
Biztonsági szemle
The Future Of The CISO - Part 2 - Jess Burn, Jeff Pollard - BSW #379
2025. Jan. 22.
Biztonsági szemle
Chinese Cyberspies Target South Korean VPN in Supply Chain Attack
Advanced persistent threat group PlushDaemon, active since 2019, is using a sophisticated modular backdoor to collect data from infected systems in South Korea.
Oldalszámozás
- Előző oldal ‹‹
- 253. oldal
- Következő oldal ››