Biztonsági szemle
![DDoS](/sites/default/files/styles/narrow_1x/public/feeds/43/0711_ddos.jpg.webp?itok=5rG37_11)
2024. máj. 13.
Biztonsági szemle
Purported Russian hackers targeted Kosovo government websites
Officials in Pristina, Kosovo, have disclosed that Russian malicious actors recently launched a DDoS attack on government websites in Kosovo, according to The Record, a news site by cybersecurity firm Recorded Future.
![](/sites/default/files/styles/narrow_1x/public/feeds/43/shutterstock_2199384551.jpg.webp?itok=o45PJd3G)
2024. máj. 13.
Biztonsági szemle
Optimizing business velocity with Cisco Full-Stack Observability
When applications are constrained by insufficient resources, the result is poor application performance or even outages. Cisco Full-Stack Observability can help you scale up or down to ensure you have enough resources to support workloads.
![](/sites/default/files/styles/narrow_1x/public/feeds/25/WOTC2024_post.png.webp?itok=mbvxmR4q)
2024. máj. 13.
Biztonsági szemle
Cisco’s Women of the Channel: Empowering Innovation, Leadership, and Success in 2024
I am thrilled to see numerous talented and trailblazing Cisco colleagues featured in CRN's 2024 Women of the Channel List. These women are at the forefront of channel thought leadership, and their dedication to our partners' success is a testament to...
![Women hand using smartphone typing, chatting conversation in chat box icons pop up. Social media maketing technology concept.Vintage soft color tone background.](/sites/default/files/styles/narrow_1x/public/feeds/e0/051324_sms_text.jpg.webp?itok=ywq2dwpm)
2024. máj. 13.
Biztonsági szemle
Flaws found in popular Telit cellular modems
Security researchers at Kaspersky's ICS CERT division revealed critical vulnerabilities in Telit Cinterion cellular modems, which are popularly used in the industrial, healthcare, and telecommunications sectors, BleepingComputer reports.
![](/sites/default/files/styles/narrow_1x/public/feeds/6f/Gold_Leigh_Prather_Alamy.jpg.webp?itok=htF4pUdp)
2024. máj. 13.
Biztonsági szemle
Why Tokens Are Like Gold for Opportunistic Threat Actors
When setting authentication token expiry policies, always lean in to security over employee convenience.
![AI chatbot – Artificial Intelligence digital concept](/sites/default/files/styles/narrow_1x/public/feeds/49/GettyImages-1494104649.jpg.webp?itok=-Ybdm8ug)
2024. máj. 13.
Biztonsági szemle
New attack method called 'LLMjacking' reported
Cybersecurity researchers have uncovered a new attack method that they have dubbed LLMjacking, which targets cloud-hosted large language model services using stolen cloud credentials, after which attackers would attempt to sell the illegal access...
![Abstract Malware Ransomware virus encrypted files with key on binary bit background.](/sites/default/files/styles/narrow_1x/public/feeds/f8/1020_ransomware.jpg.webp?itok=RIRIVhLL)
2024. máj. 13.
Biztonsági szemle
Australian lender Firstmac hacked by ransomware gang
Brisbane-based mortgage lender Firstmac has become the latest Australian business to be targeted by cybercriminals, warning customers that it suffered a data breach a day after the new Embargo cyber-extortion group leaked over 500 GB of data...
![](/sites/default/files/styles/narrow_1x/public/feeds/52/AdobeStock_521238327.jpg.webp?itok=n26K6xTu)
2024. máj. 13.
Biztonsági szemle
Ohio Lottery players' personal data compromised in cyberattack
More than 538,000 Ohio Lottery players have had their names and Social Security numbers compromised in a Christmas Eve data breach revealed this week in a regulatory filing by the state lottery, The Register reports.
![Warning icon on a digital LCD display with reflection.](/sites/default/files/styles/narrow_1x/public/feeds/64/1004_malware.jpg.webp?itok=tbMRUSIJ)
2024. máj. 13.
Biztonsági szemle
Kimsuky observed deploying new Durian malware
Kaspersky's APT trends report for the first quarter highlighted the emergence of a new threat from the North Korean threat group Kimsuky, in the form of a new sophisticated malware named Durian, which the group has used in targeted cyber attacks...
![ISC Knowledge Base](/sites/default/files/styles/narrow_1x/public/2023-10/ISC-logo-rgb-2048x1149.png.webp?itok=ICtukOrO)
2024. máj. 13.
Biztonsági szemle
DNSSEC Key and Signing Policy
BIND 9.16 introduced a new method to maintain DNSSEC on your zones. In addition to the inline-signing and auto-dnssec configuration options, there is now dnssec-policy (also see the configuration reference in the ARM). dnssec-policy replaces auto...
2024. máj. 13.
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-4671 Google Chromium in Visuals Use-After-Free Vulnerability These types of vulnerabilities are frequent attack...
![Why secure source code matters.](/sites/default/files/styles/narrow_1x/public/feeds/a4/051024_computer_monitor.jpg.webp?itok=DO3dA61T)
2024. máj. 13.
Biztonsági szemle
Why quality source code has become more important than ever in the AI era
Companies need to support their developers and coders need to double-down on the value of high-quality source code to the business.
Oldalszámozás
- Előző oldal ‹‹
- 162. oldal
- Következő oldal ››