Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/aa/Report-card%281800%29_D._Hurst_Alamy.jpg.webp?itok=t_325FTh)
2024. jún. 3.
Biztonsági szemle
CISA's Secure by Design Initiative at 1: A Report Card
There is more that needs to be done, but, so far, the initiative is a success.
![Apache HTTP Server website (www.apache.org) displayed on smartphone](/sites/default/files/styles/narrow_1x/public/feeds/fe/1212_apache.jpg.webp?itok=n7WRkmb7)
2024. jún. 3.
Biztonsági szemle
Apache Log4j threat persists in global finance sector
Organizations in the financial industry around the world were warned by cyber threat intelligence expert Anis Haboubi regarding the persistent risk of attacks exploiting the years-old Apache Log4j2 vulnerability, tracked as CVE-2021-44832, as...
![](/sites/default/files/styles/narrow_1x/public/feeds/0c/0810_gavel.jpg.webp?itok=Q4wwsdJY)
2024. jún. 3.
Biztonsági szemle
More info on Emotet leader sought by international operation
International law enforcement agencies behind Operation Endgame, which has been touted to be the biggest anti-botnet and dropper malware operation, have called for more information regarding the leader of the Emotet botnet operation dubbed "Odd," who...
![APIs](/sites/default/files/styles/narrow_1x/public/feeds/73/053025_api.jpg.webp?itok=_webCmMr)
2024. jún. 3.
Biztonsági szemle
Three ways to deliver API security
Here are three ways to build APIs that deliver the functionality and security modern organizations need.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. jún. 3.
Biztonsági szemle
Nyaralni megy? Tippek, hogy utazása „kiberbiztonságban” teljen – SANS OUCH! – 2024. június
Megjelent a SANS és a Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet közös kiadványának 2024. júniusi száma, melyben tippeket adunk arra, hogyan őrizhetjük meg "kiberbiztonságunkat" az utazások alatt is.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. jún. 3.
Biztonsági szemle
Improved Guidance for Azure Network Service Tags
Summary Microsoft Security Response Center (MSRC) was notified in January 2024 by our industry partner, Tenable Inc., about the potential for cross-tenant access to web resources using the service tags feature. Microsoft acknowledged that Tenable...
![](/sites/default/files/styles/narrow_1x/public/feeds/bb/Mehaniq-kenya-cyber-code-shutterstock.jpg.webp?itok=F3gX_-_H)
2024. jún. 3.
Biztonsági szemle
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
![<p>(Credit: AdriaVidal – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/70/AdobeStock_603723456_Editorial_Use_Only.jpg.webp?itok=mqaFxLNC)
2024. máj. 31.
Biztonsági szemle
OpenAI report reveals threat actors using ChatGPT in influence operations
The report details OpenAI’s disruption of the deceptive campaigns, which had minimal public impact.
![](/sites/default/files/styles/narrow_1x/public/feeds/00/magnifyingglass_Brain_light_Alamy_Stock_Photo.jpg.webp?itok=OyjUk9jz)
2024. máj. 31.
Biztonsági szemle
Lawyers Ask Forensics Investigators for Help Outside Cybersecurity
Attorneys are increasingly realizing that forensics investigators have skills analyzing documents and uncovering digital clues that could help them in non-cybersecurity cases.
![](/sites/default/files/styles/narrow_1x/public/feeds/20/squid-Stocktrek-images-alamy.jpg.webp?itok=U2mZxJsA)
2024. máj. 31.
Biztonsági szemle
LilacSquid APT Employs Open Source Tools, QuasarRAT
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
![](/sites/default/files/styles/narrow_1x/public/feeds/94/strategy-PhotoEdit-Alamy.jpg.webp?itok=R13BXj_o)
2024. máj. 31.
Biztonsági szemle
CISO Corner: Federal Cyber Deadlines Loom; Private Chatbot Danger
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: fighting cybersecurity burnout; BlackSuit ransomware; the SEC breach rules and risk management.
![](/sites/default/files/styles/narrow_1x/public/feeds/ca/bbc%281800%29-imageBROKER.com_GmbH_%26_Co._KG-Alamy.jpg.webp?itok=Y191XLos)
2024. máj. 31.
Biztonsági szemle
BBC Breach Puts 25K Pension Scheme Members at Risk
Though information such as dates of birth, email addresses, and home addresses were compromised, "the Beeb" assures individuals that financial information is still protected.
Oldalszámozás
- Előző oldal ‹‹
- 84. oldal
- Következő oldal ››