Biztonsági szemle
2024. szeptember 26.
Biztonsági szemle
Boredom Is the Silent Killer in Your IT Systems
An environment that values creativity, continuous learning, and calculated risk-taking can prevent boredom while building a resilient, adaptable team ready to tackle whatever challenges come their way.
2024. szeptember 26.
Biztonsági szemle
Federal probe on Temu's data practices sought
In a letter to the U.S. Securities and Exchange Commission and the FBI, Republican members of the House House Permanent Select Committee on Intelligence noted that such a probe is warranted due to the alleged relationship between Temu and Pinduoduo...
2024. szeptember 26.
Biztonsági szemle
Android memory safety bugs steeply decline
Despite prioritization for memory-safe languages, old code had only been subjected to security fixes and was largely unchanged as Google sought to advance safety and convenience in ensuring interoperability in Android.
2024. szeptember 26.
Biztonsági szemle
Prolonged spyware injection possible with ChatGPT macOS flaw
Such an attack technique dubbed "SpAIware" could be leveraged to facilitate continuous exfiltration of all inputs provided by the targeted user to ChatGPT, according to cybersecurity researcher Johann Rehberger.
2024. szeptember 26.
Biztonsági szemle
Dell claimed to be breached anew
Included in the nearly 500 MB data trove leaked by grep were information on Dell's internal ticketing system, including Agile and VPN incident reports and other ticket summaries for VPN improvements and DevOps software access requests.
2024. szeptember 26.
Biztonsági szemle
Novel Splinter post-exploitation tool examined
Aside from performing Windows command execution and remote process injection-based module implementation, Splinter — which has "exceptionally large" artifact sizes due to extensive Rust crate presence — also features file uploading and downloading...
2024. szeptember 26.
Biztonsági szemle
Microsoft 365 credentials targeted by TikTok URL-based phishing
Attacks commence with the distribution of malicious emails purporting to be an Office 365 alert luring recipients to cancel a request for inbox email deletion through a button that contains the TikTok URL, according to a Cofense Phishing Defense...
2024. szeptember 26.
Biztonsági szemle
US ISPs targeted by new Chinese cyberespionage gang
Novel Chinese cyberespionage operation Salt Typhoon was reported by The Wall Street Journal to have compromised several internet service providers across the U.S. in attacks, which its sources noted were in preparation for imminent cyber intrusions.
2024. szeptember 26.
Biztonsági szemle
Global DragonForce attacks involve custom Conti, LockBit ransomware
Intrusions conducted by DragonForce, which has been suspected to be based in Malaysia, also involved the deployment of the SystemBC backdoor and the Mimikatz and Cobalt Strike tools to facilitate further compromise to advance its double extortion...
2024. szeptember 26.
Biztonsági szemle
CISA: Ongoing critical infrastructure OT/ICS device attacks involve unsophisticated techniques
Ongoing targeting of vulnerable OT/ICS devices should prompt critical infrastructure entities to replace default passwords, activate multi-factor authentication, implement firewall protection for human-machine interfaces, and ensure up-to-date...
2024. szeptember 26.
Biztonsági szemle
How to securely deploy GenAI applications at scale
Integrating generative AI into your business model creates new risks as well as new rewards. Here's how to counter those risks.
2024. szeptember 26.
Biztonsági szemle
Why SBOMs are not enough to manage modern software risks
SBOMs offer great insight into the software supply chain, but it takes strong controls to make the code secure. .
Oldalszámozás
- Előző oldal ‹‹
- 429. oldal
- Következő oldal ››