Biztonsági szemle
![A computer screen with Javascript is seen](/sites/default/files/styles/narrow_1x/public/feeds/35/011824_javascript.jpg.webp?itok=CC9kWIrE)
2024. ápr. 16.
Biztonsági szemle
Attempted XZ Utils backdoor-like hijacking thwarted
Attempted hijacking attacks similar to the recent compromise of the XZ Utils data compression project have been averted by OpenJS Foundation researchers, according to The Record, a news site by cybersecurity firm Recorded Future.
![Abstract Red Background with Binary Code Numbers. Data Breach, Malware, Cyber Attack, Hacking](/sites/default/files/styles/narrow_1x/public/feeds/c8/040423_malware.jpg.webp?itok=--SDNIB_)
2024. ápr. 16.
Biztonsági szemle
Russian infrastructure disrupted by Ukrainian hackers
Operations of Russia's industrial sensor and monitoring infrastructure were claimed to have been disrupted by Ukrainian hacking operation Blackjack following a Fuxnet malware attack against Moscow-based underground infrastructure firm Moscollector...
![An aerial photo of the US Capitol in Washington.](/sites/default/files/styles/narrow_1x/public/feeds/25/041624_us_capitol.jpg.webp?itok=5pq0FLRe)
2024. ápr. 16.
Biztonsági szemle
Attack against Space-Eyes claimed by IntelBroker
Hackread reports that Miami-based geospatial intelligence company Space-Eyes was claimed to have been compromised by IntelBroker, which purportedly resulted in the exfiltration of the firm's sensitive data, including confidential U.S. national...
![cloud_AdobeStock_355036138](/sites/default/files/styles/narrow_1x/public/feeds/e4/AdobeStock_355036138.jpg.webp?itok=Ikbdb0RV)
2024. ápr. 16.
Biztonsági szemle
New Muddled Libra attacks set sights on cloud
Attacks by the Muddled Libra threat operation — also known as UNC3944, Scattered Spider, Scatter Swine, and Starfraud — have been redirected at cloud service providers and software-as-a-service apps as part of efforts to bolster its data extortion...
![Warning icon on a digital LCD display with reflection.](/sites/default/files/styles/narrow_1x/public/feeds/64/1004_malware.jpg.webp?itok=tbMRUSIJ)
2024. ápr. 16.
Biztonsági szemle
Steganography leveraged in new global TA558 attack campaign
More than 320 organizations in various sectors around the world, most of which are in Latin America, have been subjected to the new SteganoAmor attack campaign by the TA558 hacking operation that involved the use of steganography to enable the...
![](/sites/default/files/styles/narrow_1x/public/feeds/75/Screenshot-2024-04-12-at-10.35.38%E2%80%AFAM.png.webp?itok=1cp0p2dF)
2024. ápr. 16.
Biztonsági szemle
Synergizing Advanced Identity Threat Detection & Response Solutions
Explore the synergy of Cisco's Duo Security & Identity Intelligence, bolstering cyber defense with advanced threat detection & response capabilities
2024. ápr. 16.
Biztonsági szemle
RoboDK RoboDK
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 3.3 ATTENTION: Low attack complexity Vendor: RoboDK Equipment: RoboDK Vulnerability: Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could result in an attacker...
2024. ápr. 16.
Biztonsági szemle
Measuresoft ScadaPro
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.8 ATTENTION: Low attack complexity Vendor: Measuresoft Equipment: ScadaPro Vulnerability: Improper Access Control 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to...
2024. ápr. 16.
Biztonsági szemle
Rockwell Automation ControlLogix and GuardLogix
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: ControlLogix 5580, GuardLogix 5580, CompactLogix 5380, 1756-EN4TR Vulnerability: Improper Input Validation 2. RISK...
2024. ápr. 16.
Biztonsági szemle
CISA Releases Four Industrial Control Systems Advisories
CISA released four Industrial Control Systems (ICS) advisories on April 16, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-107-01 Measuresoft ScadaPro ICSA-24...
2024. ápr. 16.
Biztonsági szemle
Electrolink FM/DAB/TV Transmitter
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Electrolink Equipment: FM/DAB/TV Transmitter Vulnerabilities: Authentication Bypass by Assumed-Immutable Data...
![The need for SaaSBOMs](/sites/default/files/styles/narrow_1x/public/feeds/3a/0605_saas_cloud.jpg.webp?itok=DjDWCOc6)
2024. ápr. 16.
Biztonsági szemle
The Sisense Breach: A wake-up call to move beyond SBOMs
Five ways companies can move from SBOMs to SaaSBOMs to more effectively secure SaaS applications.
Oldalszámozás
- Előző oldal ‹‹
- 224. oldal
- Következő oldal ››