Biztonsági szemle
![Malware analysis](/sites/default/files/styles/narrow_1x/public/feeds/f2/0816_malware.jpg.webp?itok=u1I2LnSP)
2024. jún. 5.
Biztonsági szemle
Stealthier DarkGate malware campaign emerges
Attacks with the DarkGate malware-as-a-service operation have since involved an AutoHotKey script instead of AutoIt ones to facilitate the stealthier distribution of the malware, according to The Hacker News.
![Diversity identity and privacy concept and personal private data symbol as diverse finger prints or fingerprint icons and census population in a 3D illustration style.](/sites/default/files/styles/narrow_1x/public/feeds/d0/012624_fingerprint.jpg.webp?itok=YdwIopLF)
2024. jún. 5.
Biztonsági szemle
Code42 seeks to bolster insider threat defenses
More robust protections against insider threats are being aimed by insider risk management provider Code42 Software with a new integration and workflow for its cloud-based data protection offering Incidyr Flows, SiliconAngle reports.
![neon cloud computing technology concept, illustration.](/sites/default/files/styles/narrow_1x/public/feeds/ae/020924_cloud_computing.jpg.webp?itok=hPxjF0ew)
2024. jún. 5.
Biztonsági szemle
Malicious use of BoxedApp tool on the rise
App virtualization tool BoxedApp has been increasingly leveraged to facilitate the distribution of malicious payloads while bypassing static analysis during the past year, with threat actors particularly exploiting the tool's virtual storage, virtual...
![An "Emergency" Sign in front of a hospital in the early evening](/sites/default/files/styles/narrow_1x/public/feeds/d9/030524_emergency_entrance_hospital.jpg.webp?itok=HgrYQnWG)
2024. jún. 5.
Biztonsági szemle
Report: Severe ransomware impact most likely in rural hospitals
U.S. rural hospitals, most of which are critical access, were noted by a report from the Cyberspace Solarium Commission 2.0 to be most vulnerable to ransomware attacks due to their dependence on outdated software and lacking cybersecurity funding...
![](/sites/default/files/styles/narrow_1x/public/feeds/92/021224_ransomware.jpg.webp?itok=Q3vOUam5)
2024. jún. 5.
Biztonsági szemle
Data breach confirmed by Northern Minerals after BianLian leak
BleepingComputer reports that Australian heavy rare earths mining firm Northern Minerals has disclosed having its data stolen and exposed on the dark web following a cyberattack against its systems in late March.
![Computer keyboard mail](/sites/default/files/styles/narrow_1x/public/feeds/9b/1002_email.jpg.webp?itok=ikXKaF9o)
2024. jún. 5.
Biztonsági szemle
Impact of suspected state-backed attack against British Columbia detailed
Canadian province British Columbia had 22 government email inboxes compromised following a suspected state-sponsored cyberattack that commenced in April, which exposed information from nearly 20 individuals, reports The Record, a news site by...
![](/sites/default/files/styles/narrow_1x/public/feeds/47/Remote_%D0%95%D0%B2%D0%B3%D0%B5%D0%BD%D0%B8%D1%8F_%D0%9C%D0%B0%D1%82%D0%B2%D0%B5%D0%B5%D1%86_Alamy.jpg.webp?itok=Gzteq4tM)
2024. jún. 5.
Biztonsági szemle
Remote Work's Hidden Dangers
Ten cybersecurity strategies for enterprises to keep remote work safer.
![AI security risks](/sites/default/files/styles/narrow_1x/public/feeds/1b/041624_big_data_ai.jpg.webp?itok=GjgL-_Lc)
2024. jún. 5.
Biztonsági szemle
Five AI-based threats security pros need to understand
In the first part of a two-part series on emerging cybersecurity trends, SC Media columnist Callie Guenther explains the five leading AI-based threats facing all security teams.
![](/sites/default/files/styles/narrow_1x/public/feeds/d4/Wrestling-Vishal_Somaiya-Alamy.jpg.webp?itok=abTwdFwh)
2024. jún. 5.
Biztonsági szemle
Chinese Threat Clusters Triple-Team a High-Profile Asia Government Org
A trio of Chinese-affiliated clusters performed specialized tasks in a broader attack chain, likely under the watch of a single organization.
![](/sites/default/files/styles/narrow_1x/public/feeds/9c/world_binary_africa_Bruno_Haver_Alamy.jpg.webp?itok=lMPR2lJJ)
2024. jún. 5.
Biztonsági szemle
Africa Ranks Low on Phishing Cyber Resilience
As threats to Africa's cybersphere continue to grow, the continent faces high risks to its society and economy with a growing cyber skills gap and lack of preparedness.
![A computer identifies and measures the fingerprint on the digital surface](/sites/default/files/styles/narrow_1x/public/feeds/04/030824_digital_thumbprint.jpg.webp?itok=EwmJUFkb)
2024. jún. 5.
Biztonsági szemle
Identiverse 2024: Deepfakes, passkeys and more
The Identiverse 2024 conference last week in Las Vegas wrestled with deepfakes and presumed that passkeys are well on their way to general adoption.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. jún. 5.
Biztonsági szemle
TAG Bulletin: Q2 2024
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2024.
Oldalszámozás
- Előző oldal ‹‹
- 79. oldal
- Következő oldal ››