Biztonsági szemle
2025. február 4.
Biztonsági szemle
Chinese 'Infrastructure Laundering' Abuses AWS, Microsoft Cloud
Funnull CDN rents IPs from legitimate cloud service providers and uses them to host criminal websites, continuously cycling cloud resources in and out of use and acquiring new ones to stay ahead of cyber-defender detection.
2025. február 4.
Biztonsági szemle
Riot Security raises $30M to expand cyber training platform
Riot provides a cybersecurity training platform that simulates phishing attacks, detects data leaks, and educates employees through a chatbot named Albert.
2025. február 4.
Biztonsági szemle
Amazon Redshift enhanced with new default breach deterrents
Leading the additional protections is the default deactivation of public access to new clusters, which would only be accessible within users' Virtual Private Clouds.
2025. február 4.
Biztonsági szemle
Mississippi electricity provider breach hits over 20K
Investigation into the incident completed in October revealed that only "limited" personal information had been compromised from affected individuals, who were informed and given complimentary identity protection services in December.
2025. február 4.
Biztonsági szemle
Over 340K impacted by separate US health provider breaches
AEA confirmed being subjected to a cybersecurity incident that resulted in the exposure of information from 193,306 patients more than a month after the DragonForce ransomware operation took responsibility for the intrusion against the eye care...
2025. február 4.
Biztonsági szemle
Data breach disclosed by Mizuno after BianLian claims
While malicious network activity was first identified by Mizuno in early November, further investigation revealed that the Japanese sportswear company had its systems infiltrated since August, resulting in the periodic theft of individuals' names...
2025. február 4.
Biztonsági szemle
Updated Coyote malware facilitates more extensive compromise
Attacks with the new Coyote trojan variant over the past month involved the deployment of an LNK file executing a PowerShell command facilitating next-stage PowerShell script retrieval for the eventual launching of the trojan, which not only obtained...
2025. február 4.
Biztonsági szemle
Managing Software Risk in a World of Exploding Vulnerabilities
Organizations and development teams need to evolve from "being prepared" to "managing the risk" of security breaches.
2025. február 4.
Biztonsági szemle
Threat Modeling That Helps the Business - Sandy Carielli, Akira Brand - ASW #316
2025. február 4.
Biztonsági szemle
Google reveals Gemini AI use by more than 40 state-sponsored APTs
Iran-backed groups were the most prolific adversarial users, while North Korean APTs used the LLM for likely IT worker scams.
2025. február 4.
Biztonsági szemle
Record number of exploited security vulnerabilities reached in 2024
A total of 768 CVE-listed vulnerabilities exploited in the wild, a 20% increase from 2023.
2025. február 4.
Biztonsági szemle
DNSFilter's Annual Security Report Reveals Worrisome Spike in Malicious DNS Requests
Oldalszámozás
- Előző oldal ‹‹
- 294. oldal
- Következő oldal ››