Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/4f/240521_CLUS_Networking_Blog_Feature-1.png.webp?itok=nNfFqvc6)
2024. jún. 4.
Biztonsági szemle
Cisco Live 2024: Ensure Digital Resilience, Pervasive Security, and Simpler Operations
How do you effectively manage experiences if you no longer own all the infrastructure? The answer is at the heart of new operational innovations and infrastructure announced at Cisco Live 2024. They’re all part of the Cisco Networking Cloud platform.
![Unknown vectors haunts ransomware plauybook](/sites/default/files/styles/narrow_1x/public/feeds/0c/040924_email.jpg.webp?itok=Rw_ZwFFI)
2024. jún. 4.
Biztonsági szemle
Have I Been Pwned updated to include 361M stolen email addresses
Data breach notification service Have I Been Pwned has been updated to include 361 million email addresses from credentials exfiltrated in credential-stuffing attacks and password-stealing malware intrusions that have been leaked on Telegram channels...
![2d illustration ransomware computer virus](/sites/default/files/styles/narrow_1x/public/feeds/ca/1120_ransomware.jpg.webp?itok=Gsqa9wXC)
2024. jún. 4.
Biztonsági szemle
Mandiant finds escalating ransomware activity
CyberScoop reports that ransomware attacks became more prevalent last year following a slight decline in 2022, with data leak site posts increasing 75% year-over-year to their highest since being first monitored in 2020.
![WiFi router](/sites/default/files/styles/narrow_1x/public/feeds/ad/1206_router.jpg.webp?itok=P8MiO7d0)
2024. jún. 4.
Biztonsági szemle
Millions of Cox modems potentially at risk of compromise
Millions of modems by U.S. broadband provider Cox could have been hacked through the exploitation of several authentication bypass vulnerabilities that could enable privilege escalation and data exfiltration activities, reports The Hacker News.
![Microsoft Azure logo](/sites/default/files/styles/narrow_1x/public/feeds/7c/033123_microsoft_azure.jpg.webp?itok=jPM3nYyE)
2024. jún. 4.
Biztonsági szemle
Microsoft disputes Azure Service Tags vulnerability
Microsoft has contradicted a Tenable report describing a high-severity vulnerability within Azure Service Tags that could be exploited to facilitate Azure service spoofing and firewall rule bypass, emphasizing service tags' purpose as routing...
![Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen](/sites/default/files/styles/narrow_1x/public/feeds/8d/1226_data_leak.jpg.webp?itok=AZJHDqy3)
2024. jún. 4.
Biztonsági szemle
Financial Business and Consumer Solutions breach toll exceeds 3.2M
BleepingComputer reports that more than 3.2 million individuals were noted to have had their data exfiltrated in the breach of U.S. nationally licensed debt collection agency Financial Business and Consumer Solutions in February, which is over a...
![Microsoft Azure company logo on a website with blurry stock market developments in the background, seen on a computer screen through a magnifying glass.](/sites/default/files/styles/narrow_1x/public/feeds/ed/050324_microsoft_azure.jpg.webp?itok=_Vns2w1E)
2024. jún. 4.
Biztonsági szemle
Unsecured Azure Blob leaks over 40K US students' data
Digital Pix & Composites, a professional photography firm specializing in graduation, fraternity, and sorority composites, had personal information from 43,000 students from 222 universities across the U.S., including Stanford University, the...
![](/sites/default/files/styles/narrow_1x/public/feeds/cf/api_Wright_Studio_shutterstock.jpg.webp?itok=2B1Trw-D)
2024. jún. 4.
Biztonsági szemle
Cox Biz Auth-Bypass Bug Exposes Millions of Devices to Takeover
The US broadband provider fixed an issue that allowed attackers to gain access to business customers’ modems, and then access info and execute commands with the same permissions of an ISP support team.
![Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen](/sites/default/files/styles/narrow_1x/public/feeds/8d/1226_data_leak.jpg.webp?itok=AZJHDqy3)
2024. jún. 4.
Biztonsági szemle
Threat actor considers leaking 3B records from background check firm
Widely known threat actor USDoD was discovered by VX-Underground researchers was planning to expose 2.9 billion records belonging to U.S., Canadian, and British citizens believed to have been stolen by the SXUL threat operation from Florida-based...
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12836″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/c2/CSP_177_Patrick_Benoit_-_1920x1080_99f339dc-a63a-42c3-9fa2-ac67aa75642b.jpg.webp?itok=KA0Ov3TL)
2024. jún. 4.
Biztonsági szemle
Point Vs. Platform: Improving TCO Cost/Benefit - Patrick Benoit - CSP #177
![](/sites/default/files/styles/narrow_1x/public/feeds/64/Playbook%281800%29_Ivelin_Radkov_Alamy.jpg.webp?itok=4n7O1h7m)
2024. jún. 4.
Biztonsági szemle
Perfecting the Proactive Security Playbook
It's more important than ever for organizations to prepare themselves and their cybersecurity postures against known and unknown threats.
![Phishing](/sites/default/files/styles/narrow_1x/public/feeds/0e/0725_phishing.jpg.webp?itok=DcEwHLz9)
2024. jún. 4.
Biztonsági szemle
Illinois Secretary of State's office impacted by phishing incident
Officials from the Illinois Secretary of State's office disclosed the compromise of residents' driver's license details and Social Security numbers following a phishing attack against its employees in April, StateScoop reports.
Oldalszámozás
- Előző oldal ‹‹
- 102. oldal
- Következő oldal ››