Biztonsági szemle
![A computer screen with Javascript is seen](/sites/default/files/styles/narrow_1x/public/feeds/35/011824_javascript.jpg.webp?itok=CC9kWIrE)
2024. máj. 21.
Biztonsági szemle
New OpenSSF initiative provides threat intelligence on open source projects
The Open Source Security Foundation has unveiled the new Siren threat intelligence sharing list that seeks to facilitate real-time information sharing regarding security flaws impacting open source projects, reports The Register.
![Hospital emergency sign](/sites/default/files/styles/narrow_1x/public/feeds/76/0504_emergency_sign.jpg.webp?itok=NXZbkIPK)
2024. máj. 21.
Biztonsági szemle
New $50M HHS program seeks to bolster hospital cybersecurity
The U.S. Department of Health and Human Services has introduced the new Universal PatchinG and Remediation for Autonomous DEfense program, which offers $50 million toward the strengthening of hospital cybersecurity amid growing cybersecurity threats...
![](/sites/default/files/styles/narrow_1x/public/feeds/d0/Globe%281800%29_Skorzewiak_Alamy.jpg.webp?itok=I4mEMjiS)
2024. máj. 21.
Biztonsági szemle
Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations?
As we face continued headwinds on provisions like data flows and e-customs duties, further progress is both needed and achievable in digital trade policy.
![Water drop](/sites/default/files/styles/narrow_1x/public/feeds/62/041524_water_drop.jpg.webp?itok=2u6W6g4Z)
2024. máj. 21.
Biztonsági szemle
EPA to strengthen water cybersecurity inspections
CyberScoop reports that escalating cybersecurity threats against the U.S. water infrastructure have prompted the Environmental Protection Agency to commit to bolstering its security-focused inspections and enforcement activities in water utilities...
![Image of ransomware, computer language, circuit board pattern over data server room](/sites/default/files/styles/narrow_1x/public/feeds/2f/051624_ransomware.jpg.webp?itok=ZFo26ILX)
2024. máj. 21.
Biztonsági szemle
LockBit admits University of Siena cyberattack
Italy's University of Siena, which is the world's first publicly funded university, was claimed to be compromised by the LockBit ransomware gang in an attack that has interrupted operations of several university services, reports The Cyber Express.
![Indian hacker and computer expert. Laptop with binary computer code and India flag on the screen.](/sites/default/files/styles/narrow_1x/public/feeds/f0/052124_india_flag.jpg.webp?itok=1mZJAJew)
2024. máj. 21.
Biztonsági szemle
Indian elections subjected to hacktivist attacks
Hackread reports that cyberattacks aimed at the ongoing Indian general elections have risen by almost 300% since last year, with the polls being targeted by 16 independent hacktivist operations, including Anonymous Bangladesh and Anon Black Flag.
![Warning icon on a digital LCD display with reflection.](/sites/default/files/styles/narrow_1x/public/feeds/64/1004_malware.jpg.webp?itok=tbMRUSIJ)
2024. máj. 21.
Biztonsági szemle
Updated BiBi Wiper malware leveraged in attacks against Israel, Albania
BleepingComputer reports that Israel and Albania have been subjected to attacks with an updated version of the BiBi Wiper malware with disk partition table deletion capabilities, which has been linked with suspected Iranian state-sponsored hacking...
![Code id tech finger safety verification concept scan background lock identity cyberspace control digital computer access system biometric security fingerprint technology identification scanner](/sites/default/files/styles/narrow_1x/public/feeds/9e/041124_fingerprint.jpg.webp?itok=B0DcqE-C)
2024. máj. 21.
Biztonsági szemle
GitHub, FileZilla exploited for multiple malware delivery
Sophisticated Russian threat operation GitCaught has exploited both GitHub and FileZilla to facilitate the deployment of several malicious payloads, including the Atomic macOS Stealer, or AMOS, as well as the Octo, Lumma, and Vidar information...
![Abstract Red Background with Binary Code Numbers. Data Breach, Malware, Cyber Attack, Hacking](/sites/default/files/styles/narrow_1x/public/feeds/c8/040423_malware.jpg.webp?itok=--SDNIB_)
2024. máj. 21.
Biztonsági szemle
Various malware strains deployed via Foxit PDF Reader exploit
Attacks exploiting a design vulnerability in the Foxit PDF reader have been launched by various threat actors to facilitate the delivery of several malicious payloads, including Agent Tesla, Remcos RAT, AsyncRAT, and XWorm, among others, reports The...
![AWS - Amazon Web Services](/sites/default/files/styles/narrow_1x/public/feeds/1c/011224_aws.jpg.webp?itok=Ou0sgW9L)
2024. máj. 21.
Biztonsági szemle
Major cloud platforms at risk of critical Fluent Bit vulnerability
Microsoft Azure, Google Cloud Platform, Amazon Web Services, and other major cloud providers and technology firms could be compromised in attacks leveraging the critical memory corruption flaw within the widely used logging and metrics software...
![Screenshot 2024-05-21 at 7.30.13 AM](/sites/default/files/styles/narrow_1x/public/feeds/98/Screenshot-2024-05-21-at-7.30.13-AM.png.webp?itok=dr0TxKhL)
2024. máj. 21.
Biztonsági szemle
2024 Identiverse trends report: Key findings
The following is an excerpt from the 2024 Identiverse Trends Report.
![How to protect CISOs](/sites/default/files/styles/narrow_1x/public/feeds/b6/010824_sec.jpg.webp?itok=gY5GMLQv)
2024. máj. 21.
Biztonsági szemle
Four ways CISOs can navigate today’s legal and regulatory minefields
CISOs are under the legal gun today – and that’s why they can only succeed if they have the full support of the C-suite.
Oldalszámozás
- Előző oldal ‹‹
- 100. oldal
- Következő oldal ››