Biztonsági szemle
![A vibrant blue padlock security icon lights up within a shield, surrounded by complex tech circuitry, underscoring robust digital protection.](/sites/default/files/styles/narrow_1x/public/feeds/b3/041124_cybersecurity_shield.jpg.webp?itok=vyxglJIx)
2024. ápr. 23.
Biztonsági szemle
New Bitsight, Moody's service seeks to bolster cyber risk management
Increasingly prevalent cybersecurity risks have prompted Bitsight and Moody's Corp., to collaborate and develop the new Implied Cyber Threat service aimed at strengthening cyber risk management efforts, SiliconAngle reports.
![Russian hack attack concept, on the computer keyboard. 3D rendering](/sites/default/files/styles/narrow_1x/public/feeds/18/041824_russia_hack.jpg.webp?itok=p4SwGd0j)
2024. ápr. 23.
Biztonsági szemle
Indiana water plant hack admitted by Russian hackers
CNN reports that Indiana-based water and wastewater treatment plant and electricity provider Tipton Municipal Utilities has been targeted by a cyberattack on Apr. 19 claimed by Russia-linked hacking operation CyberArmyofRussia_Reborn.
![Department of Health and Human Services Office for Civil Rights enforcement](/sites/default/files/styles/narrow_1x/public/feeds/87/service-pnp-highsm-25100-25147v-1.jpg.webp?itok=wz-bm9Xx)
2024. ápr. 23.
Biztonsági szemle
HIPAA updated to include more robust reproductive health data privacy protections
The Department of Health and Human Services has introduced updates to the Health Insurance Portability and Accountability Act that would prevent healthcare organizations, doctors, and insurers from providing protected health information to state...
![](/sites/default/files/styles/narrow_1x/public/feeds/71/CISA-alert.jpg.webp?itok=oMES1Va5)
2024. ápr. 23.
Biztonsági szemle
GAO: Most Biden cybersecurity EO requirements achieved
Forty-nine of 55 requirements under the Biden administration's executive order aimed at bolstering federal IT systems' cybersecurity defenses were noted by the Government Accountability Office to have already been fulfilled by the Cybersecurity and...
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12824″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/f7/CSP_171_John_Germain_-_1920x1080_88bdb586-c73e-44c0-9e6c-8c89d569ebf5.jpg.webp?itok=ltTmj98j)
2024. ápr. 23.
Biztonsági szemle
The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171
![](/sites/default/files/styles/narrow_1x/public/feeds/dc/LLM_Bakhtiar_Zein_Alamy.jpg.webp?itok=HKq7p-ok)
2024. ápr. 23.
Biztonsági szemle
Lessons for CISOs From OWASP's LLM Top 10
It's time to start regulating LLMs to ensure they're accurately trained and ready to handle business deals that could affect the bottom line.
![](/sites/default/files/styles/narrow_1x/public/feeds/75/ransomware-data.jpg.webp?itok=zYXT29Gq)
2024. ápr. 23.
Biztonsági szemle
Post-ransomware disruptions continue at California county library system
Operations of California's Solano Partner Libraries and St. Helena, or SPLASH, continue to be interrupted weeks after the county's library network was targeted by a ransomware attack earlier this month, StateScoop reports.
![Microsoft March Patch Tuesday roundup](/sites/default/files/styles/narrow_1x/public/feeds/5c/Windows-logo-textured.jpg.webp?itok=aetwsjTc)
2024. ápr. 23.
Biztonsági szemle
Rootkit capabilities likely with Windows bugs
Several rootkit-like capabilities could be obtained by threat actors through the exploitation of vulnerabilities in Windows' DOS-to-NT path conversion process, including file and process concealment and compromised prefetch file analysis, reports The...
![Russia flag is depicted on the screen with the program code. The concept of modern technology and site development.](/sites/default/files/styles/narrow_1x/public/feeds/c7/011924_russia_flag.jpg.webp?itok=_7DmXwyD)
2024. ápr. 23.
Biztonsági szemle
Ukraine critical infrastructure subjected to Sandworm attacks
Nearly 20 water, energy, and heating providers across Ukraine were noted by the country's Computer Emergency Response Team to have their information and communications systems targeted by Russian state-backed advanced persistent threat operation...
![GitHub symbol](/sites/default/files/styles/narrow_1x/public/feeds/1a/0623_github.jpg.webp?itok=F1pKMy2W)
2024. ápr. 23.
Biztonsági szemle
Abusing GitHub flaw could compromise GitLab
Open-source DevOps software project GitLab has also been impacted by the same security issue in GitHub comments that has been exploited by threat actors through Microsoft repository-linked URLs to facilitate the distribution of malware that was made...
![](/sites/default/files/styles/narrow_1x/public/feeds/bb/spyware_Robert_Brown_Alamy.jpg.webp?itok=4yFYfOZY)
2024. ápr. 23.
Biztonsági szemle
US Gov Slaps Visa Restrictions on Spyware Honchos
The State Department can now deny entrance to the US for individuals accused of profiting from spyware-related human rights abuses, and their immediate family members.
![](/sites/default/files/styles/narrow_1x/public/feeds/f1/RussianHacking_SciencePhotoLibrary-AlamyStock.jpg.webp?itok=Nz3-gQWl)
2024. ápr. 23.
Biztonsági szemle
Russia's Fancy Bear Pummels Windows Print Spooler Bug
The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.
Oldalszámozás
- Előző oldal ‹‹
- 205. oldal
- Következő oldal ››