Biztonsági szemle
2024. Okt. 3.
Biztonsági szemle
DDoS attacks possible with exploitation of CUPS vulnerabilities
Nearly 34% of over 198,000 internet-exposed devices affected by the CUPS flaws, tracked as CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, could be leveraged for DDoS attacks, which involve the delivery of a packet designating a...
2024. Okt. 3.
Biztonsági szemle
Intrusions involving critical Ivanti EPM vulnerability underway
Such active intrusions have prompted the flaw's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog, with federal agencies urged to remediate unpatched instances by Oct. 23.
2024. Okt. 3.
Biztonsági szemle
What Communications Companies Need to Know Before Q-Day
NIST standardized three algorithms for post-quantum cryptography. What does that mean for the information and communications technology (ICT) industry?
2024. Okt. 3.
Biztonsági szemle
Five ways to craft a strategic remediation plan
The threat landscape will only get worse in the months and years ahead – here’s how to prepare the company’s response to inevitable cyberattacks.
2024. Okt. 3.
Biztonsági szemle
AI 'Nude Photo Generator' Delivers Infostealers Instead of Images
The FIN7 group is mounting a sophisticated malware campaign that spans numerous websites, to lure people with a deepfake tool promising to create nudes out of photos.
2024. Okt. 3.
Biztonsági szemle
China-Backed APT Group Culling Thai Government Data
CeranaKeeper is bombarding Southeast Asia with data exfiltration attacks via file-sharing services such as Pastebin, OneDrive, and GitHub, researchers say.
2024. Okt. 3.
Biztonsági szemle
Near-'perfctl' Fileless Malware Targets Millions of Linux Servers
Armed with a staggering arsenal of at least 20,000 different exploits for various Linux server misconfigurations, perfctl is everywhere, annoying, and tough to get rid of.
2024. Okt. 3.
Biztonsági szemle
4 Ways to Fight AI-Based Fraud
Generative AI is being used to make cyberscams more believable. Here's how organizations can counter that using newly emerging tools and reliable methods.
2024. Okt. 3.
Biztonsági szemle
14 DrayTek vulnerabilities patched, including max-severity RCE flaw
More than 267,000 internet-exposed routers are likely vulnerable to exploitation.
2024. Okt. 3.
Biztonsági szemle
Zimbra email platform under active attack, RCE possible
If properly executed, the exploit would allow an attacker to obtain remote code execution on the target server.
2024. Okt. 2.
Biztonsági szemle
North Korea's 'Stonefly' APT Swarms US Private Co's. for Profit
Despite a $10 million bounty on one member, APT45 is not slowing down, pivoting from intelligence gathering to extorting funds for Kim Jong-Un's regime.
2024. Okt. 2.
Biztonsági szemle
NSA Releases 6 Principles of OT Cybersecurity
Organizations can use this guide to make decisions about designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as to enable business continuity for critical services.
Oldalszámozás
- Előző oldal ‹‹
- 378. oldal
- Következő oldal ››