Biztonsági szemle
![Encryption your data. Digital Lock. Hacker attack and data breach. Big data with encrypted computer code. Safe your data. Cyber internet security and privacy concept. Database storage 3d illustration](/sites/default/files/styles/narrow_1x/public/feeds/61/GilDabahCol-e1704835108226.jpg.webp?itok=oYDczt83)
2024. máj. 24.
Biztonsági szemle
Tens of millions of US criminal database info exposed
Cybernews reports that widely known threat actor USDoD has exposed a U.S. criminal database purportedly having 70 million rows of sensitive information dating from 2020 to 2024 allegedly exfiltrated by the SXUL threat operation.
![Source PC website developer. Real software development code. JavaScript code in text editor. Computer interface. Abstract technology background. Java Software engineer concept.](/sites/default/files/styles/narrow_1x/public/feeds/52/030323_javascript.jpg.webp?itok=aLmuSRnj)
2024. máj. 24.
Biztonsági szemle
Supply chain attack hits courtroom recording platform
Widely used Justice AV Solutions Viewer courtroom recording software has been subjected to a supply chain attack involving the deployment of a backdoor that enabled total system takeover, according to The Record, a news site by cybersecurity firm...
![Malicious computer programming code in the shape of a skull.](/sites/default/files/styles/narrow_1x/public/feeds/d4/040424_ransomware.jpg.webp?itok=KPpI71mi)
2024. máj. 24.
Biztonsági szemle
Novel ShrinkLocker ransomware exploits Microsoft BitLocker
Organizations in the steel and vaccine manufacturing sectors, as well as a government entity in Mexico, Jordan, and Indonesia have been subjected to attacks with the novel ShrinkLocker ransomware strain that exploits Microsoft BitLocker for file...
![Chinese hacker. Laptop with binary computer code and china flag](/sites/default/files/styles/narrow_1x/public/feeds/df/031924_china_flag.jpg.webp?itok=2CIBVinP)
2024. máj. 24.
Biztonsági szemle
Ongoing Chinese cyberespionage operation targets government orgs
Chinese advanced persistent threat operation TGR-STA-0043, previously tracked as CL-STA-0043, has targeted at least seven government organizations across Asia, Africa, and the Middle East as part of the Operation Diplomatic Specter cyberespionage...
![Phishing](/sites/default/files/styles/narrow_1x/public/feeds/0e/0725_phishing.jpg.webp?itok=DcEwHLz9)
2024. máj. 24.
Biztonsági szemle
Cyberespionage schemes leveraged in escalating Moroccan gift card theft campaign
Moroccan hacking operation Storm-0539, also known as Ant Lion, has ramped up its gift card theft activities with cyberespionage tactics ahead of the Memorial Day holiday, according to BleepingComputer.
![](/sites/default/files/styles/narrow_1x/public/feeds/5b/Kittipong-irasukhanont_Alamy-Stock-Photo.jpg.webp?itok=RoTKStga)
2024. máj. 24.
Biztonsági szemle
Future-Proof Your Cybersecurity AI Strategy
An effective, long-term XDR strategy will address the ongoing need for rapid analysis and continual vetting of the latest threat intelligence.
2024. máj. 24.
Biztonsági szemle
Cisco Releases May 2024 Cisco ASA, FMC, and FTD Software Security Publication
Cisco released a bundled publication for security advisories that address vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Management Center (FMC), and Firepower Threat Defense (FTD) software. A cyber threat actor could exploit...
![Non-Human Identiies](/sites/default/files/styles/narrow_1x/public/feeds/ee/052324_robot_ai.jpg.webp?itok=7-RAQ9At)
2024. máj. 24.
Biztonsági szemle
There are no bad machines – only ones that behave badly because of human error
Protecting non-human identities has become a real challenge – here’s what to do about them.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. máj. 24.
Biztonsági szemle
Sajtószemle – 2024. 21. hét
A 2024. 21. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.05.17. és 2024.05.23. között kezelt incidensek statisztikai adatait is tartalmazza.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
2024. máj. 24.
Biztonsági szemle
ISC Stormcast For Friday, May 24th, 2024 https://isc.sans.edu/podcastdetail/8996, (Fri, May 24th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/08/ai-Mopic-Alamy.jpg.webp?itok=hhYCfDMg)
2024. máj. 24.
Biztonsági szemle
CyberArk Goes All In on Machine Identity with Venafi Deal
CyberArk's $1.54 billion agreement to buy Venafi is a sign of how human and machine identities will converge with certificate lifecycle management.
![](/sites/default/files/styles/narrow_1x/public/feeds/d3/325351_DR23_Graphics_General_Large_Text_v1.png.webp?itok=t_2x_glb)
2024. máj. 23.
Biztonsági szemle
Concentric AI to Unveil Data Security Remediation and Compliance Reporting Capabilities at Infosecurity Europe 2024
Oldalszámozás
- Előző oldal ‹‹
- 123. oldal
- Következő oldal ››