Biztonsági szemle

2024. Aug. 2.
Biztonsági szemle
Third-Party Risk: Mitigation strategies
As partners, subcontractors, and hardware vendors enter the picture, network defenders need to reconsider what does and doesn’t constitute a threat.

2024. Aug. 2.
Biztonsági szemle
Inaugural Defense Department cyber policy head receives Senate nod
In his confirmation hearing for the assistant secretary of Defense for cyber policy post, Sulmeyer said that he would focus on strengthening U.S. digital forces' "combat power" and "sustained readiness" against increasingly sophisticated...

2024. Aug. 2.
Biztonsági szemle
Russian hackers part of US-Russia prisoner swap
NBC News reports that the U.S. has agreed to release convicted Russian hackers Vladimir Klyushin and Roman Seleznev, along with eight others, in exchange for Wall Street Journal reporter Evan Gershkovich and other American political prisoners held by...

2024. Aug. 2.
Biztonsági szemle
US, others commit to address data, privacy risks of connected cars
"The United States and like-minded nations will explore options for advancing affirmative cybersecurity standards and coordinating other possible policy measures to mitigate risks," said the U.S. State Department in a statement regarding the meeting...

2024. Aug. 2.
Biztonsági szemle
Massive CrowdStrike outage prompts class action
Despite repeatedly proclaiming the robustness of Falcon, CrowdStrike has not properly evaluated anti-threat updates prior to release leading to the widespread disruption, claimed the Massachusetts-based Plymouth County Retirement Association in its...

2024. Aug. 2.
Biztonsági szemle
GAO: Immediate EPA action in boosting water, wastewater sector cybersecurity needed
Aside from failing to perform risk assessments for the water and wastewater sector, the EPA has not also determined cybersecurity-related objectives, goals, activities, and performance measurements, as well as key roles and efforts coordination...

2024. Aug. 2.
Biztonsági szemle
Many VMware ESXi instances remain vulnerable to actively exploited bug
Despite the elevated detections, workarounds may have already been applied in some VMware ESXi instances, according to The Shadowserver Foundation.

2024. Aug. 2.
Biztonsági szemle
Infostealing PyPI packages spread through StackExchange
Threat actors who created StackExchange accounts commented on popular threads with high-quality answers that included links to the packages, including 'spl-types,' 'sol-structs,' 'sol-instruct,' 'raydium,' and 'raydium-sdk,' which facilitated the...

2024. Aug. 2.
Biztonsági szemle
Hundreds of fake sites used in Facebook-targeted e-commerce fraud
While most of the intrusions involved websites spoofing a leading e-commerce platform and power tools maker, as well as fake sales offers for widely used products, attackers also leveraged fake Facebook user comments to facilitate the scheme.

2024. Aug. 2.
Biztonsági szemle
Covert Sitting Ducks domain hijacking attack poses widespread threat
Domains impacted by attacks with Sitting Ducks, which involves the exploitation of domain registrar and authoritative DNS provider misconfigurations and lame delegation, have been leveraged to facilitate various traffic distribution systems...

2024. Aug. 2.
Biztonsági szemle
Various RATs deployed via TryCloudflare feature exploitation
Intrusions commenced with the delivery of tax-themed phishing emails with attachments or links redirecting to an LNK payload, which executes either BAT or CMD scripts that result in the PowerShell and Python installer deployment before installing the...

2024. Aug. 2.
Biztonsági szemle
Three ways to prepare for the upcoming CIRCIA cyberattack disclosure law
The new reporting law goes into effect next year – so it’s time for companies to prepare.
Oldalszámozás
- Előző oldal ‹‹
- 442. oldal
- Következő oldal ››