Biztonsági szemle
![Managing secrets in the cloud](/sites/default/files/styles/narrow_1x/public/feeds/1c/060524_cloud_security.jpg.webp?itok=S4YJEutW)
2024. jún. 13.
Biztonsági szemle
Third-party breach confirmed by Cylance
BlackBerry-owned cybersecurity firm Cylance has confirmed having its data compromised as a result of a "third-party platform" breach following a post by the threat actor dubbed "Sp1d3r" peddling the exfiltrated information for $750,000...
![](/sites/default/files/styles/narrow_1x/public/feeds/28/microsoft_Robert_K._Chin_alamy.jpg.webp?itok=suY-9elh)
2024. jún. 13.
Biztonsági szemle
Microsoft, Late to the Game on Dangerous DNSSEC Zero-Day Flaw
Why the company took so long to address the issue is not known given that most other stakeholders had a fix out for the issue months ago.
![PHP code lines on a monitor](/sites/default/files/styles/narrow_1x/public/feeds/45/060724_php_code.jpg.webp?itok=yYMUKhHS)
2024. jún. 13.
Biztonsági szemle
New consortium seeks to bolster Rust use in safety-critical systems
Inadequate resources supporting safety-critical systems in the Rust ecosystem have prompted the Rust Foundation to establish the new Safety-Critical Rust Consortium alongside several other organizations in a bid to advance responsible usage of the...
![Phishing Alert text button on keyboard](/sites/default/files/styles/narrow_1x/public/feeds/ff/0705_phishing.jpg.webp?itok=q5EXKjje)
2024. jún. 13.
Biztonsági szemle
Most impersonated sectors, brands in phishing examined
Hackread reports that organizations in the IT and technology industry were most spoofed in phishing scams between January 2020 and March 2024, followed by those in the banking and financial services sector.
![](/sites/default/files/styles/narrow_1x/public/feeds/ef/Cybercrime%281800%29_Igor_Stevanovic_Alamy.jpg.webp?itok=KRBA26Z2)
2024. jún. 13.
Biztonsági szemle
How Cybercrime Empires Are Built
Strong partnerships and collaborations between industry and law enforcement are the most critical ways to take down cybercrime groups before they grow.
![](/sites/default/files/styles/narrow_1x/public/feeds/a9/India_Pakistan%281800%29-Frank_Nowikowski-Alamy.jpg.webp?itok=cFLI6mgt)
2024. jún. 13.
Biztonsági szemle
Pakistani Hacking Team 'Celestial Force' Spies on Indian Gov't, Defense
Against a backdrop of political conflict, a years-long cyber-espionage campaign in South Asia is coming to light.
![](/sites/default/files/styles/narrow_1x/public/feeds/4e/armageddon-Tithi_Luadthong-Alamy.jpg.webp?itok=T1V5_wTl)
2024. jún. 13.
Biztonsági szemle
Rockwell's ICS Directive Comes As Critical Infrastructure Risk Peaks
Critical infrastructure is facing increasingly disruptive threats to physical processes, while thousands of devices are online with weak authentication and riddled with exploitable bugs.
![](/sites/default/files/styles/narrow_1x/public/feeds/b5/AIchip-_Vasyl_Yakobchuk-alamy.jpg.webp?itok=JztFufQ5)
2024. jún. 13.
Biztonsági szemle
Nvidia Patches High-Severity Flaws in GPU Drivers
Nvidia's latest GPUs are a hot commodity for AI, but security vulnerabilities could expose them to attacks from hackers.
![](/sites/default/files/styles/narrow_1x/public/feeds/53/Face_scan%281800%29-Zoonar_GmbH-Alamy-1.jpg.webp?itok=SMyVaXM0)
2024. jún. 12.
Biztonsági szemle
Scores of Biometrics Bugs Emerge, Highlighting Authentication Risks
Face scans stored like passwords inevitably will be compromised, like passwords are. But there's a crucial difference between the two that organizations can rely on when their manufacturers fail.
![](/sites/default/files/styles/narrow_1x/public/feeds/e0/cleveland_Mira_alamy.jpg.webp?itok=nPMderAr)
2024. jún. 12.
Biztonsági szemle
Cleveland City Hall Shuts Down After Cyber Incident
As city officials continue to investigate, it's unclear which systems were affected and whether it was a ransomware attack.
![](/sites/default/files/styles/narrow_1x/public/feeds/f8/Handcuffs%281800%29_Andrew_Unangst_Alamy.jpg.webp?itok=kFwfbnAh)
2024. jún. 12.
Biztonsági szemle
LockBit & Conti Ransomware Hacker Busted in Ukraine
Accused cybercriminal has special skills that helped Conti and LockBit ransomware evade detection, according to law enforcement.
![](/sites/default/files/styles/narrow_1x/public/feeds/95/assetmgmt-Dark_Reading.jpg.webp?itok=SR5tnZ6q)
2024. jún. 12.
Biztonsági szemle
Asset Management Holds the Key to Enterprise Defense
Obtaining — and maintaining — a complete inventory of technology assets is essential to effective enterprise security. How do organizations get that inventory?
Oldalszámozás
- Előző oldal ‹‹
- 65. oldal
- Következő oldal ››