Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/94/0905_online_banking.jpg.webp?itok=cz1brRtR)
2024. jún. 28.
Biztonsági szemle
Evolve Bank breach takes toll on fintech firms
Data compromise has already been confirmed by fintech startup Mercury, which disclosed the hack of certain account numbers, business owner names, emails, and deposit balances as a result of the Evolve intrusion.
![](/sites/default/files/styles/narrow_1x/public/feeds/52/AdobeStock_521238327.jpg.webp?itok=n26K6xTu)
2024. jún. 28.
Biztonsági szemle
KADOKAWA hack admitted by BlackSuit ransomware group
Included in the information allegedly stolen from KADOKAWA were the company's confidential files, contacts, business plans, financial details, and employee data.
![](/sites/default/files/styles/narrow_1x/public/feeds/cf/061424_data_breach.jpg.webp?itok=QDyTdZwq)
2024. jún. 28.
Biztonsági szemle
Alleged APT breach investigated by TeamViewer
Additional details were lacking but the remote access and remote control software provider revealed that there has been no indication of any product environment or customer data compromise.
![](/sites/default/files/styles/narrow_1x/public/feeds/92/Robot%281800%29_Mopic_Alamy.jpg.webp?itok=4RXLzFcD)
2024. jún. 28.
Biztonsági szemle
Unfounded Fears: AI Extinction-Level Threats & the AI Arms Race
There is an extreme lack of evidence of AI-related danger, and proposing or implementing limits on technological advancement isn't the answer.
![Microsoft logo on the website homepage.](/sites/default/files/styles/narrow_1x/public/feeds/b0/061324_microsoft.jpg.webp?itok=jjSGxOuG)
2024. jún. 28.
Biztonsági szemle
Midnight Blizzard breaches more Microsoft customer emails
Impacted entities have been given a link by Microsoft wherein they could review emails affected by the incident, email notifications revealed.
![](/sites/default/files/styles/narrow_1x/public/feeds/87/061224_malware.jpg.webp?itok=8wy12WIo)
2024. jún. 28.
Biztonsági szemle
Malware cluster bomb leveraged by novel Unfurling Hemlock threat operation
Intrusions by Unfurling Hemlock, which is believed to be of Eastern European origin, commence with the delivery of malicious emails with the 'WEXTRACT.EXE' file.
![](/sites/default/files/styles/narrow_1x/public/feeds/fc/gas-chromatographs.jpg.webp?itok=9VBEMeQN)
2024. jún. 28.
Biztonsági szemle
White hats make blood-boiling bug find in gas chromatographs
Researchers have disclosed a trio of flaws in a popular brand of machines used for blood testing.
![](/sites/default/files/styles/narrow_1x/public/feeds/29/Mainframe.jpeg.webp?itok=-iBRdwxA)
2024. jún. 28.
Biztonsági szemle
1Touch.io Integrates AI Into Mainframe Security
Just because mainframes are old doesn't mean they're not in use. Mainframe Security Posture Management brings continuous monitoring and vigilance to the platform.
![](/sites/default/files/styles/narrow_1x/public/feeds/d6/Compliance%281800%29_NicoElNino_Alamy.jpg.webp?itok=Yg9JElkD)
2024. jún. 28.
Biztonsági szemle
Don't Forget to Report a Breach: A Cautionary Tale
Responding to an incident quickly is important, but it shouldn't come at the expense of reporting it to the appropriate regulatory bodies.
![Zero Trust Network Architecture and Zero Trust Architecture - ZTA and ZTNA - Data-centric Cybersecurity Solutions that Protect Resources over a Network Perimeter](/sites/default/files/styles/narrow_1x/public/feeds/c8/012624_zero_trust.jpg.webp?itok=McBG6pfM)
2024. jún. 28.
Biztonsági szemle
What you need to know before you can modernize your network-security architecture
Moving to a zero-trust or SASE network-security model can be an enormous undertaking. Here’s what to learn before you embark on the journey.
![<p>Today’s columnist, Amichai Shulman of Nokod Security, offers four tips for mitigating RPA security risks. </p>](/sites/default/files/styles/narrow_1x/public/feeds/83/business-automation-management-executive-2-1.jpg.webp?itok=3HpXl_04)
2024. jún. 28.
Biztonsági szemle
Four ways to mitigate robotic process automation security risks
Here are four tips for getting the most of of RPA applications.
![](/sites/default/files/styles/narrow_1x/public/feeds/fd/school_Gregg-Vignal_Alamy-Stock-Photo.jpg.webp?itok=-0gXKTt2)
2024. jún. 28.
Biztonsági szemle
New FCC Pilot Shores Up Security for K-12, Libraries
Data-rich and resource-poor, schools and libraries around the country make attractive targets for cybercriminals looking for an easy score, but a new federal program is looking to aid their defenses by providing much-needed financial support.
Oldalszámozás
- Előző oldal ‹‹
- 46. oldal
- Következő oldal ››