Biztonsági szemle

2025. Aug. 8.
Biztonsági szemle
ISC Stormcast For Friday, August 8th, 2025 https://isc.sans.edu/podcastdetail/9562, (Fri, Aug 8th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Aug. 8.
Biztonsági szemle
Silver Fox APT Blurs the Line Between Espionage & Cybercrime
Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks.

2025. Aug. 7.
Biztonsági szemle
Air France, KLM Alert Authorities of Data Breach
While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more.

2025. Aug. 7.
Biztonsági szemle
Prime Security Wins Black Hat's Startup Spotlight Competition
Security startups of all stripes submitted applications for Black Hat USA's Startup Spotlight. Prime Security won with its AI security architect platform.

2025. Aug. 7.
Biztonsági szemle
Privilege Escalation Issue in Amazon ECS Leads to IAM Hijacking
A software developer discovered a way to abuse an undocumented protocol in Amazon's Elastic Container Service to escalate privileges, cross boundaries and gain access to other cloud resources.

2025. Aug. 7.
Biztonsági szemle
'Samourai' Cryptomixer Founders Plead Guilty to Money Laundering
As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million.

2025. Aug. 7.
Biztonsági szemle
Citizen Lab Founder Flags Rise of US Authoritarianism
Citizen Lab director and founder Ron Deibert explained how civil society is locked in "vicious cycle," and human rights are being abused as a result, covering Israeli spyware, the Khashoggi killing, and an erosion of democratic norms in the US.

2025. Aug. 7.
Biztonsági szemle
Payback: 'ShinyHunters' Clocks Google via Salesforce
In 2024, it was Snowflake. In 2025, it's Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, Cisco, and Adidas.

2025. Aug. 7.
Biztonsági szemle
ISC's DNSSEC Look-Aside Validation Registry
Decommissioned as of September 30, 2017 Introduction DLV (DNSSEC Look-aside Validation) was an extension to the DNSSECbis protocol. It was designed as a transition mechanism to assist in early DNSSEC adoption by allowing DNSSEC signing and validation...

2025. Aug. 7.
Biztonsági szemle
The Critical Flaw in CVE Scoring
With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.

2025. Aug. 7.
Biztonsági szemle
Chanel Alerts Clients of Third-Party Breach
The fashion house is added to a list of other companies that have been impacted by similar breaches, including Tiffany & Co. and Louis Vuitton.

2025. Aug. 7.
Biztonsági szemle
Improving Cloud-VPN Resiliency to DoS Attacks With IKE Throttling
Explore a network-layer throttling mechanism to improve the resiliency of Cloud VPNs IKE servers, which are typically subject to IKE flood attacks.
Oldalszámozás
- Előző oldal ‹‹
- 25. oldal
- Következő oldal ››