Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/71/insurance_AdobeStockImages_cropped-scaled.jpg.webp?itok=evKHAxId)
2024. júl. 3.
Biztonsági szemle
Declining cyberinsurance premiums examined
Cyberinsurance premiums were observed by brokerage firm Howden to have declined by nearly 15% from peak levels in 2022 and while such a decrease was attributed to improved cybersecurity, experts said that the lower rates were more likely to be a...
![Interior of Big Modern server room with rows of rack cabinets, data centre or mining farm interior with beautiful neon lights reflections.](/sites/default/files/styles/narrow_1x/public/feeds/89/042424_server_room.jpg.webp?itok=S0PF8ba0)
2024. júl. 3.
Biztonsági szemle
Maximum severity PTC license server bug fixed
Major product lifecycle management software provider PTC has released a fix for a maximum severity vulnerability impacting a license server of its widely used Creo Elements/Direct modeling CAD software, tracked as CVE-2024-6071, reports SecurityWeek.
![binary code and magnifying glass](/sites/default/files/styles/narrow_1x/public/feeds/df/032724_software_bug.jpg.webp?itok=H3BolHTb)
2024. júl. 3.
Biztonsági szemle
Google unveils new KVM bug bounty program
Google has moved to strengthen Kernel-based Virtual Machine hypervisor security with the introduction of the new kvmCTF vulnerability reward program, reports BleepingComputer.
![](/sites/default/files/styles/narrow_1x/public/feeds/cd/Intel_Tester128_shutterstok.jpg.webp?itok=yhDSS4qR)
2024. júl. 3.
Biztonsági szemle
Intel CPUs Face Spectre-Like 'Indirector' Attack That Leaks Data
"Indirector" targets a speculative execution component in silicon that previous research has largely overlooked.
![](/sites/default/files/styles/narrow_1x/public/feeds/34/AI%281800%29_Alexey_Kotelnikov_Alamy.jpg.webp?itok=z2J1N10W)
2024. júl. 3.
Biztonsági szemle
Friend or Foe? AI's Complicated Role in Cybersecurity
Staying informed about the latest AI security solutions and best practices is critical in remaining a step ahead of increasingly clever cyberattacks.
![Hospital emergency sign](/sites/default/files/styles/narrow_1x/public/feeds/76/0504_emergency_sign.jpg.webp?itok=NXZbkIPK)
2024. júl. 3.
Biztonsági szemle
LockBit attack disrupts largest Croatian hospital
Croatia's University Hospital Centre Zagreb or KBC Zagreb, which is the country's largest hospital, had its IT systems taken down for a day and its emergency and radiological services disrupted following a cyberattack admitted by the LockBit...
![Close-up of female hands using mobile phone and holding credit card](/sites/default/files/styles/narrow_1x/public/feeds/fe/0622_mobile_banking.jpg.webp?itok=o3ufRE6Z)
2024. júl. 3.
Biztonsági szemle
Evolve Bank breach impacts Yieldstreet
U.S. alternative investment platform Yieldstreet disclosed the compromise of some of its customers' data as a result of the LockBit ransomware attack against Evolve Bank & Trust, TechCrunch reports.
![Cloud technology and Data storage concept, Concept of Exchange information and data with internet cloud technology. FTP(File Transfer Protocol) files receiver.](/sites/default/files/styles/narrow_1x/public/feeds/c8/041024_file_transfer.jpg.webp?itok=Nps6mYF3)
2024. júl. 3.
Biztonsági szemle
Quoality systems misconfiguration exposes over 1M people's data
Cybernews reports that Indian hospitality guest management platform provider Quoality had the data of more than one million hotel guests leaked as a result of an Elastic cluster misconfiguration.
![password to access personal user data, cybersecurity concept](/sites/default/files/styles/narrow_1x/public/feeds/09/052824_password.jpg.webp?itok=q_-TH0w7)
2024. júl. 3.
Biztonsági szemle
Thousands of child abuse site users potentially exposed by infostealer logs
Infostealer logs, or data exfiltrated by information-stealing malware, could be leveraged to reveal the identities of thousands of individuals using websites sharing child sexual abuse material over the darknet, reports The Record, a news site by...
![](/sites/default/files/styles/narrow_1x/public/feeds/87/061224_malware.jpg.webp?itok=8wy12WIo)
2024. júl. 3.
Biztonsági szemle
Infostealer spread via trojanized Indian software product installers
Attackers have leveraged trojanized versions of Indian software provider Conceptworld's installers for its Copywhiz, Notezilla, and RecentX programs to facilitate the delivery of information-stealing malware, The Hacker News reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/4c/nki-e1713192650201.jpg.webp?itok=6QGXcqg9)
2024. júl. 3.
Biztonsági szemle
Tájékoztatás az OpenSSH (regreSSHion) sérülékenységéről
Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) tájékoztatót ad ki glibc alapú Linux rendszereket érintő, OpenSSH (regreSSHion) sérülékenységgel kapcsolatban, annak súlyossága és kihasználhatósága miatt. A...
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. júl. 3.
Biztonsági szemle
What’s new in the MSRC Report Abuse Portal and API
The Microsoft Security Response Center (MSRC) has always been at the forefront of addressing cyber threats, privacy issues, and abuse arising from Microsoft Online Services. Building on our commitment, we have introduced several updates to the Report...
Oldalszámozás
- Előző oldal ‹‹
- 39. oldal
- Következő oldal ››