Biztonsági szemle
![Wireless network and connection abstract data background with wifi symbol](/sites/default/files/styles/narrow_1x/public/feeds/06/051724_wifi.jpg.webp?itok=Ii3tKFhY)
2024. máj. 17.
Biztonsági szemle
Downgrade attacks enabled by newly discovered Wi-Fi flaw
Security researchers have identified a design flaw in the IEEE 802.11 Wi-Fi standard that could allow malicious actors to trick users into connecting to less secure networks, The Hacker News reports.
![key on monitor screen, cybersecurity concept](/sites/default/files/styles/narrow_1x/public/feeds/a0/051324_ransomware.jpg.webp?itok=OF7mf0mg)
2024. máj. 17.
Biztonsági szemle
Report: Cat-phishing of legitimate websites on the rise
HP's latest Wolf Security Threat Insights Report reveals that cybercriminals are employing "cat-phishing" techniques to deceive victims and using overdue invoice lures and Living-off-the-Land tactics to bypass security defenses, reports SiliconAngle.
![Computer keyboard, close-up button of the flag of North Korea.](/sites/default/files/styles/narrow_1x/public/feeds/6b/1127_north_korea-e1704488987937.jpg.webp?itok=fXobV-Uh)
2024. máj. 17.
Biztonsági szemle
Human rights activists targeted in Kimsuky malware campaign
The North Korea-linked Kimsuky hacking group has launched a new social engineering campaign targeting activists in the North Korean human rights and anti-North Korea sectors, The Hacker News reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/f3/20240512-103432.png.webp?itok=UBsmQv_g)
2024. máj. 17.
Biztonsági szemle
Another PDF Streams Example: Extracting JPEGs, (Fri, May 17th)
In my diary entry " Analyzing PDF Streams" I showed how to use my tools file-magic.py and myjson-filter.py together with my PDF analysis tool pdf-parser.py to analyze PDF streams en masse.
![](/sites/default/files/styles/narrow_1x/public/feeds/fb/Cisco-XDR_Evergreen_1200x600_Blog_Option-8.jpg.webp?itok=uXAWkgZV)
2024. máj. 17.
Biztonsági szemle
Accessing Secure Client Cloud Management after the SecureX EoL
Secure Client Management capabilities aren’t going away with the SecureX EOL, the functionality is simply migrating to the Cisco Security Cloud Control service.
![](/sites/default/files/styles/narrow_1x/public/feeds/e3/microsoft_MAXSHOT.PL_shutterstock.jpg.webp?itok=hGDFzEi-)
2024. máj. 17.
Biztonsági szemle
Microsoft Has Yet to Patch 7 Pwn2Own Zero-Days
A number of serious Windows bugs still haven't made their way into criminal circles, but that won't remain the case forever — and time is running short before ZDI releases exploit details.
![10 software supply chain security tips](/sites/default/files/styles/narrow_1x/public/feeds/1b/051624_programming_code.jpg.webp?itok=U48cYQjP)
2024. máj. 17.
Biztonsági szemle
Ten ways to minimize software supply chain risks
Organizations must make software supply chain security a collaborative effort where everyone on the development team gets involved.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. máj. 17.
Biztonsági szemle
Sajtószemle – 2024. 20. hét
A 2024. 20. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2024.05.10. és 2024.05.16. között kezelt incidensek statisztikai adatait is tartalmazza.
![](/sites/default/files/styles/narrow_1x/public/feeds/dd/talos-cyber-blog_1200x628_hero.jpg.webp?itok=x4R9arwG)
2024. máj. 17.
Biztonsági szemle
Critical Steps to Bolster UK’s Cyber Resilience: Insights for Policy Makers from Cisco’s Cyber Readiness Index
In the face of growing cybersecurity threats, UK policymakers have intensified efforts to protect the nation's digital infrastructure. This blog looks at insights from the UK McPartland review and the interdependence between cyber security and...
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
2024. máj. 17.
Biztonsági szemle
ISC Stormcast For Friday, May 17th, 2024 https://isc.sans.edu/podcastdetail/8986, (Fri, May 17th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![<p>Island’s Mike Fey</p>](/sites/default/files/styles/narrow_1x/public/feeds/c6/051624_island_mike_fey.jpg.webp?itok=p9vxdLRj)
2024. máj. 17.
Biztonsági szemle
The enterprise browser: The first win-win-win for CISOs, CIOs and end users
Island's Mikey Fey on how enterprise browsers combine security and productivity.
![<p>Intezer’s Jim McDonough</p>](/sites/default/files/styles/narrow_1x/public/feeds/b7/051624_intezer_jim_mcdonough.jpg.webp?itok=-A4geVtS)
2024. máj. 17.
Biztonsági szemle
One big problem SOC teams can actually solve with AI
Intezer's Jim McDonough on what AI brings to the security table for SOC teams.
Oldalszámozás
- Előző oldal ‹‹
- 144. oldal
- Következő oldal ››