Biztonsági szemle

2025. Aug. 12.
Biztonsági szemle
ISC Stormcast For Tuesday, August 12th, 2025 https://isc.sans.edu/podcastdetail/9566, (Tue, Aug 12th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Aug. 11.
Biztonsági szemle
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
A swarm of US agencies joined with international partners to take down servers and domains and seize more than $1 million associated with BlackSuit (Royal) ransomware operations, a group that has been a chronic, persistent threat against critical...

2025. Aug. 11.
Biztonsági szemle
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
REvil affiliate Yaroslav Vasinskyi, who was convicted last year for his role in the 2021 Kaseya ransomware supply chain attack, said the Russian government was instrumental to the attack's execution.

2025. Aug. 11.
Biztonsági szemle
Black Hat NOC Expands AI Implementation Across Security Operations
Corelight's James Pope gave Dark Reading an inside look at this year's Black Hat Network Operations Center, detailing security challenges and rising trends — many related to increased AI use.

2025. Aug. 11.
Biztonsági szemle
Researchers Warn of 'Hidden Risks' in Passwordless Account Recovery
Passwordless authentication is becoming more common, but account recovery poses increased risks that can lead to account takeovers. It's especially dangerous because even low-skilled attackers can achieve success.

2025. Aug. 11.
Biztonsági szemle
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours
Researchers paired the jailbreaking technique with storytelling in an attack flow that used no inappropriate language to guide the LLM into producing directions for making a Molotov cocktail.

2025. Aug. 11.
Biztonsági szemle
Utilities, Factories at Risk From Encryption Holes in Industrial Protocol
The OPC UA communication protocol is widely used in industrial settings, but despite its complex cryptography, the open source protocol appears to be vulnerable in a number of different ways.

2025. Aug. 11.
Biztonsági szemle
Will Secure AI Be the Hottest Career Path in Cybersecurity?
Securing AI systems represents cybersecurity's next frontier, creating specialized career paths as organizations grapple with novel vulnerabilities, regulatory requirements, and cross-functional demands.

2025. Aug. 11.
Biztonsági szemle
Google Chrome Enterprise: Keeping Businesses Safe From Threats on the Web
Dark Reading's Terry Sweeney and Google Cloud Security's Jason Kemmerer discuss how organizations can secure the modern workplace with zero trust browser protection for remote and hybrid teams.

2025. Aug. 11.
Biztonsági szemle
How Maclaren Racing Gets From the Browser to the Track
In a conversation with Dark Reading's Terry Sweeney, Dr. Lisa Jarman from McLaren Racing says cutting-edge innovation must coexist with rigorous security protocols.

2025. Aug. 11.
Biztonsági szemle
ISC Stormcast For Monday, August 11th, 2025 https://isc.sans.edu/podcastdetail/9564, (Mon, Aug 11th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Aug. 10.
Biztonsági szemle
Google Paid Ads for Fake Tesla Websites, (Sun, Aug 10th)
In recent media events, Tesla has demoed progressively more sophisticated versions of its Optimus robots. The sales pitch is pretty simple: "Current AI" is fun, but what we really need is not something to create more funny kitten pictures. We need AI...
Oldalszámozás
- Előző oldal ‹‹
- 23. oldal
- Következő oldal ››