Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/dc/LLM_Bakhtiar_Zein_Alamy.jpg.webp?itok=HKq7p-ok)
2024. ápr. 23.
Biztonsági szemle
Lessons for CISOs From OWASP's LLM Top 10
It's time to start regulating LLMs to ensure they're accurately trained and ready to handle business deals that could affect the bottom line.
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12824″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/f7/CSP_171_John_Germain_-_1920x1080_88bdb586-c73e-44c0-9e6c-8c89d569ebf5.jpg.webp?itok=ltTmj98j)
2024. ápr. 23.
Biztonsági szemle
The Challenges of Managing Security in an IT/OT Environment - John Germain - CSP #171
![](/sites/default/files/styles/narrow_1x/public/feeds/75/ransomware-data.jpg.webp?itok=zYXT29Gq)
2024. ápr. 23.
Biztonsági szemle
Post-ransomware disruptions continue at California county library system
Operations of California's Solano Partner Libraries and St. Helena, or SPLASH, continue to be interrupted weeks after the county's library network was targeted by a ransomware attack earlier this month, StateScoop reports.
![Microsoft March Patch Tuesday roundup](/sites/default/files/styles/narrow_1x/public/feeds/5c/Windows-logo-textured.jpg.webp?itok=aetwsjTc)
2024. ápr. 23.
Biztonsági szemle
Rootkit capabilities likely with Windows bugs
Several rootkit-like capabilities could be obtained by threat actors through the exploitation of vulnerabilities in Windows' DOS-to-NT path conversion process, including file and process concealment and compromised prefetch file analysis, reports The...
![Russia flag is depicted on the screen with the program code. The concept of modern technology and site development.](/sites/default/files/styles/narrow_1x/public/feeds/c7/011924_russia_flag.jpg.webp?itok=_7DmXwyD)
2024. ápr. 23.
Biztonsági szemle
Ukraine critical infrastructure subjected to Sandworm attacks
Nearly 20 water, energy, and heating providers across Ukraine were noted by the country's Computer Emergency Response Team to have their information and communications systems targeted by Russian state-backed advanced persistent threat operation...
![GitHub symbol](/sites/default/files/styles/narrow_1x/public/feeds/1a/0623_github.jpg.webp?itok=F1pKMy2W)
2024. ápr. 23.
Biztonsági szemle
Abusing GitHub flaw could compromise GitLab
Open-source DevOps software project GitLab has also been impacted by the same security issue in GitHub comments that has been exploited by threat actors through Microsoft repository-linked URLs to facilitate the distribution of malware that was made...
![](/sites/default/files/styles/narrow_1x/public/feeds/bb/spyware_Robert_Brown_Alamy.jpg.webp?itok=4yFYfOZY)
2024. ápr. 23.
Biztonsági szemle
US Gov Slaps Visa Restrictions on Spyware Honchos
The State Department can now deny entrance to the US for individuals accused of profiting from spyware-related human rights abuses, and their immediate family members.
![](/sites/default/files/styles/narrow_1x/public/feeds/f1/RussianHacking_SciencePhotoLibrary-AlamyStock.jpg.webp?itok=Nz3-gQWl)
2024. ápr. 23.
Biztonsági szemle
Russia's Fancy Bear Pummels Windows Print Spooler Bug
The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.
![](/sites/default/files/styles/narrow_1x/public/feeds/5d/Screenshot%25202024-04-23%2520at%25208_34_03%25E2%2580%25AFAM.png.webp?itok=_im-881k)
2024. ápr. 23.
Biztonsági szemle
Struts "devmode": Still a problem ten years later?, (Tue, Apr 23rd)
Like many similar frameworks and languages, Struts 2 has a "developer mode" (devmode) offering additional features to aid debugging. Error messages will be more verbose, and the devmode includes an OGNL console. OGNL, the Object-Graph Navigation...
![](/sites/default/files/styles/narrow_1x/public/feeds/69/vpn_Wright_Studio_shutterstock.jpg.webp?itok=wc9Uq3vH)
2024. ápr. 23.
Biztonsági szemle
Teetering on the Edge: VPNs, Firewalls' Nonexistent Telemetry Lures APTs
State-sponsored groups are targeting critical vulnerabilities in virtual private network (VPN) gateways, firewall appliances, and other edge devices to make life difficult for incident responders, who rarely have visibility into the devices.
2024. ápr. 23.
Biztonsági szemle
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on April 23, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-051-03 Mitsubishi Electric Electrical...
2024. ápr. 23.
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2022-38028 Microsoft Windows Print Spooler Privilege Escalation Vulnerability These types of vulnerabilities are...
Oldalszámozás
- Előző oldal ‹‹
- 206. oldal
- Következő oldal ››