Biztonsági szemle
2024. Szep. 18.
Biztonsági szemle
Global targeting of Marko Polo cybercrime operation detailed
While most of the scams involved spearphishing attacks spreading the Atomic macOS Stealer via malicious Zoom meeting client builds, Marko Polo also impersonated productivity software, blockchain-based projects, and online games to facilitate...
2024. Szep. 18.
Biztonsági szemle
Unsecured Elasticsearch cluster exposes over 3M vehicle records
Aside from containing vehicle owners' names, birthdates, and phone numbers, such an Elasticsearch cluster also featured vehicle production dates, chassis and engine numbers, and other records with a "special needs" designation, according to Cybernews...
2024. Szep. 18.
Biztonsági szemle
Accounting software targeted to breach construction sector
Almost 35,000 brute-force attempts have been conducted by threat actors against a single host's Microsoft SQL Server leveraged by the accounting software for database operations, according to researchers from Huntress.
2024. Szep. 18.
Biztonsági szemle
Temu refutes claim of extensive data compromise
While information in the stolen database, which has been peddled on BreachForums, was purported to include customers' full names, birthdates, gender, usernames and IDs, hashed passwords, phone numbers, shipping addresses, and IP addresses, Temu...
2024. Szep. 18.
Biztonsági szemle
Microsoft Azure tools increasingly leveraged in ransomware attacks
After installing dependencies and upgrading .NET to version 8, ransomware gangs leveraged several Azure Storage Explorer instances to accelerate uploads of stolen files to Azure Blob storage before being transferred to their storage, according to a...
2024. Szep. 18.
Biztonsági szemle
Infostealers: An Early Warning for Ransomware Attacks
Can cyber defenders use the presence of infostealers as a canary in the coal mine to preempt ransomware attacks?
2024. Szep. 18.
Biztonsági szemle
As Geopolitical Tensions Mount, Iran's Cyber Operations Grow
Increasing attacks by the OilRig/APT34 group linked to Iran's Ministry of Intelligence and Security show that the nation's capabilities are growing, and targeting regional allies and enemies alike.
2024. Szep. 17.
Biztonsági szemle
'CloudImposer' attack targets Google Cloud services
Researchers uncovered a vulnerability that could have placed millions of Google Cloud instances at risk of remote hijack.
2024. Szep. 17.
Biztonsági szemle
CISA Urges Software Makers to Eliminate XSS Flaws
The latest Secure by Design alert from CISA outlines recommended actions security teams should implement to reduce the prevalence of cross-site scripting vulnerabilities in software.
2024. Szep. 17.
Biztonsági szemle
ServiceNow ‘knowledge base’ misconfiguration leaks sensitive data
Security pros say KBs can be easily misconfigured – data on more than 1,000 KBs exposed.
2024. Szep. 17.
Biztonsági szemle
Zero-Click RCE Bug in macOS Calendar Exposes iCloud Data
A researcher bypassed the Calendar sandbox, Gatekeeper, and TCC in a chain attack that allowed for wanton theft of iCloud photos.
2024. Szep. 17.
Biztonsági szemle
'Marko Polo' Creates Globe-Spanning Cybercrime Juggernaut
The Eastern European group is actively expanding its financial fraud activities, with its pipelines representing a veritable Silk Road for the transfer of cryptocurrency, and lucrative and exploitable data.
Oldalszámozás
- Előző oldal ‹‹
- 403. oldal
- Következő oldal ››