Biztonsági szemle
![Ransomware attack](/sites/default/files/styles/narrow_1x/public/feeds/84/0926_ransomware.jpg.webp?itok=hK1UAKBN)
2024. máj. 1.
Biztonsági szemle
Philadelphia Inquirer breach impacts over 25K
The Philadelphia Inquirer has confirmed that 25,549 individuals had their personal and financial details exfiltrated following a cyberattack last May, according to BleepingComputer.
![The JPMorgan logo is displayed on a smartphone screen and in the background](/sites/default/files/styles/narrow_1x/public/feeds/95/0501_jpmorgan.jpg.webp?itok=H80g1YMQ)
2024. máj. 1.
Biztonsági szemle
More than 450K hit by JPMorgan breach
Major U.S. multinational financial services firm JPMorgan had information from more than 450,000 of its customers compromised following a data breach in August 2021, reports Cybernews.
![Stickers, buttons and pencils with the WordPress logo are seen in a pile.](/sites/default/files/styles/narrow_1x/public/feeds/15/071522_wordpress.jpg.webp?itok=DP8ZSyJa)
2024. máj. 1.
Biztonsági szemle
Novel Wpeeper Android malware examined
BleepingComputer reports that hacked WordPress sites have been used as relay command-and-control servers by the novel Wpeeper Android malware, which has been spread via a pair of app stores impersonating the Uptodown App Store and is believed to have...
![Microsoft Azure logo](/sites/default/files/styles/narrow_1x/public/feeds/7c/033123_microsoft_azure.jpg.webp?itok=jPM3nYyE)
2024. máj. 1.
Biztonsági szemle
Microsoft Azure, Cloudflare lures leveraged to spread Latrodectus malware downloader
Threat actors have leveraged Microsoft Azure and Cloudflare lures to facilitate phishing campaigns deploying the Latrodectus malware downloader, also known as IceNova and Unidentified 111, BleepingComputer reports.
![The Docker website is displayed on a computer.](/sites/default/files/styles/narrow_1x/public/feeds/86/022423_docker_hub.jpg.webp?itok=6rf54yXa)
2024. máj. 1.
Biztonsági szemle
Malicious repositories proliferate in Docker Hub
More than three million of 4.79 imageless repositories uploaded to Docker Hub over the past five years have been leveraged to target the container registry's users in three separate malicious campaigns, reports The Hacker News.
![ISC Knowledge Base](/sites/default/files/styles/narrow_1x/public/2023-10/ISC-logo-rgb-2048x1149.png.webp?itok=ICtukOrO)
2024. máj. 1.
Biztonsági szemle
Kea Hook Libraries
Kea Hook Library Packages Kea Hooks are separate libraries that can be optionally installed with Kea to provide additional functionality. Some of the Kea hooks are licensed under the MPL 2.0 open source license, and are packaged with the open source...
2024. máj. 1.
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-7028 GitLab Community and Enterprise Editions Improper Access Control Vulnerability These types of vulnerabilities...
2024. máj. 1.
Biztonsági szemle
CERT/CC Reports R Programming Language Vulnerability
CERT Coordination Center (CERT/CC) has released information on a vulnerability in R programming language implementations ( CVE-2024-27322). A cyber threat actor could exploit this vulnerability to take control of an affected system. Users and...
2024. máj. 1.
Biztonsági szemle
CISA and Partners Release Fact Sheet on Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity
Today, CISA, in collaboration with U.S. and international partners, published a joint fact sheet, Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity. This fact sheet provides information and mitigations associated with cyber...
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
2024. máj. 1.
Biztonsági szemle
ISC Stormcast For Wednesday, May 1st, 2024 https://isc.sans.edu/podcastdetail/8962, (Wed, May 1st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/23/brains-VincentDrago-alamy.jpg.webp?itok=94dYTPjk)
2024. máj. 1.
Biztonsági szemle
Verizon DBIR: Basic Security Gaffes Underpin Bumper Crop of Breaches
MOVEit drove a big chunk of the increase, but human vulnerability to social engineering and failure to patch known bugs led to a doubling of breaches since 2023, said Verizon Business.
![](/sites/default/files/styles/narrow_1x/public/feeds/8c/eyshcjdmzg_1Oct23_Apr24.PNG.webp?itok=em7XaKV5)
2024. máj. 1.
Biztonsági szemle
Linux Trojan - Xorddos with Filename eyshcjdmzg, (Mon, Apr 29th)
I reviewed a filename I see regularly uploaded to my DShield sensor eyshcjdmzg that have been seeing since the 1 October 2023 which has multiple hashes and has been labeled as trojan.xorddos/ddos. These various files have only been uploaded to my...
Oldalszámozás
- Előző oldal ‹‹
- 185. oldal
- Következő oldal ››