Biztonsági szemle
![A digital warning sign with "SYSTEM HACKED" in bright red, overlaying a complex background of computer code and digital interfaces, with a deep blue and black color scheme, creating a sense of urgency and alarm.](/sites/default/files/styles/narrow_1x/public/feeds/43/051724_system_hack.jpg.webp?itok=UcSfviNR)
2024. máj. 17.
Biztonsági szemle
Financial companies must have data breach incident plans, SEC says
The Securities and Exchange Commission announced amendments to a 24-year regulation that will require certain financial firms including broker-dealers, funding portals, registered investment advisers, transfer agents, and investment companies to...
![handcuffs sit on the keyboard of a laptop. cybercrime](/sites/default/files/styles/narrow_1x/public/feeds/86/032124_laptop_handcuffs.jpg.webp?itok=MQyJuEt0)
2024. máj. 17.
Biztonsági szemle
Arrests made in North Korean remote job scam targeting US firms
U.S. prosecutors announced the arrests of an American woman and a Ukrainian man for aiding North Korean IT workers posing as Americans to secure remote jobs at over 300 U.S. companies, Reuters reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/89/Dany_Kurniawan-cyber-stockmarket-shutterstock.jpg.webp?itok=1wIjRP-j)
2024. máj. 17.
Biztonsági szemle
CISOs and Their Companies Struggle to Comply With SEC Disclosure Rules
Most companies still can't determine whether a breach is material within the four days mandated by the SEC, skewing incident response.
![](/sites/default/files/styles/narrow_1x/public/feeds/16/Data%281800%29_marcos_alvarado_Alamy.jpg.webp?itok=onJyKJot)
2024. máj. 17.
Biztonsági szemle
Whose Data Is It Anyway? Equitable Access in Cybersecurity
Cybersecurity cannot be solely about defending against threats; it must also empower organizations with their data.
![Closeup of an American "I voted" sticker placed on a navy shirt.](/sites/default/files/styles/narrow_1x/public/feeds/9f/051726_vote_sticker.jpg.webp?itok=rE2msZ35)
2024. máj. 17.
Biztonsági szemle
Cybersecurity summit at Google tackles election threats
Cybersecurity experts convened at Google's Boulder, Colorado, campus to address election threats, particularly the challenges posed by advanced technologies like deepfakes, CBS News reports.
![AI, Artificial Intelligence](/sites/default/files/styles/narrow_1x/public/feeds/9a/0608_artificial_intelligence.jpg.webp?itok=v71DLEsH)
2024. máj. 17.
Biztonsági szemle
Researchers: 'Adversarial attacks' capable of producing harmful AI responses
A study by Amazon Web Services researchers has revealed critical security vulnerabilities in large language models that understand and respond to speech, which could allow them to be manipulated into generating harmful responses using sophisticated...
![Wireless network and connection abstract data background with wifi symbol](/sites/default/files/styles/narrow_1x/public/feeds/06/051724_wifi.jpg.webp?itok=Ii3tKFhY)
2024. máj. 17.
Biztonsági szemle
Downgrade attacks enabled by newly discovered Wi-Fi flaw
Security researchers have identified a design flaw in the IEEE 802.11 Wi-Fi standard that could allow malicious actors to trick users into connecting to less secure networks, The Hacker News reports.
![key on monitor screen, cybersecurity concept](/sites/default/files/styles/narrow_1x/public/feeds/a0/051324_ransomware.jpg.webp?itok=OF7mf0mg)
2024. máj. 17.
Biztonsági szemle
Report: Cat-phishing of legitimate websites on the rise
HP's latest Wolf Security Threat Insights Report reveals that cybercriminals are employing "cat-phishing" techniques to deceive victims and using overdue invoice lures and Living-off-the-Land tactics to bypass security defenses, reports SiliconAngle.
![Computer keyboard, close-up button of the flag of North Korea.](/sites/default/files/styles/narrow_1x/public/feeds/6b/1127_north_korea-e1704488987937.jpg.webp?itok=fXobV-Uh)
2024. máj. 17.
Biztonsági szemle
Human rights activists targeted in Kimsuky malware campaign
The North Korea-linked Kimsuky hacking group has launched a new social engineering campaign targeting activists in the North Korean human rights and anti-North Korea sectors, The Hacker News reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/f3/20240512-103432.png.webp?itok=UBsmQv_g)
2024. máj. 17.
Biztonsági szemle
Another PDF Streams Example: Extracting JPEGs, (Fri, May 17th)
In my diary entry " Analyzing PDF Streams" I showed how to use my tools file-magic.py and myjson-filter.py together with my PDF analysis tool pdf-parser.py to analyze PDF streams en masse.
![](/sites/default/files/styles/narrow_1x/public/feeds/fb/Cisco-XDR_Evergreen_1200x600_Blog_Option-8.jpg.webp?itok=uXAWkgZV)
2024. máj. 17.
Biztonsági szemle
Accessing Secure Client Cloud Management after the SecureX EoL
Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.
![](/sites/default/files/styles/narrow_1x/public/feeds/e3/microsoft_MAXSHOT.PL_shutterstock.jpg.webp?itok=hGDFzEi-)
2024. máj. 17.
Biztonsági szemle
Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.
Oldalszámozás
- Előző oldal ‹‹
- 143. oldal
- Következő oldal ››