Biztonsági szemle
2025. május 14.
Biztonsági szemle
Spectre vulnerability mitigations circumvented
Intel's hardware-based safeguards against attacks exploiting the Spectre data leaking vulnerabilities impacting its processors could be bypassed by new Branch Predictor Race Conditions, reports The Register.
2025. május 14.
Biztonsági szemle
Actively exploited critical Fortinet flaw fixed
Updates have been issued by Fortinet to address a critical zero-day remote code execution vulnerability, tracked as CVE-2025-32756, which has already been leveraged to compromise FortiVoice enterprise phone systems, according to BleepingComputer.
2025. május 14.
Biztonsági szemle
Orca Security Gets AI-Powered Remediation From Opus Deal
The acquisition will enhance Orca's CNAPP offering with autonomous vulnerability remediation and prevention technologies from Opus.
2025. május 14.
Biztonsági szemle
Simplify and Scale Security With Cisco Hybrid Mesh Firewall
Modern enterprises face challenges balancing security with the operational needs. Cisco solves this with Cisco Hybrid Mesh Firewall.
2025. május 14.
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-32756 Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability These types of vulnerabilities are...
2025. május 14.
Biztonsági szemle
Another day, another phishing campaign abusing google.com open redirects, (Wed, May 14th)
A couple of weeks ago, I came across a phishing campaign that highlights a recurring issue with open redirect vulnerabilities in well-known and trusted services.
2025. május 14.
Biztonsági szemle
Hacktivists Make Little Impact During India-Pakistan Conflict
While hacktivists claimed more than 100 successful attacks against Indian government, education, and military targets, the attacks were overblown in most cases and often did not even happen.
2025. május 14.
Biztonsági szemle
ISC Stormcast For Wednesday, May 14th, 2025 https://isc.sans.edu/podcastdetail/9450, (Wed, May 14th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. május 14.
Biztonsági szemle
Tycoon 2FA phishing kit update timeline reveals new evasion techniques
Browser fingerprinting and additional payload encryption are the most recent methods used.
2025. május 14.
Biztonsági szemle
Microsoft fixes 75 vulnerabilities, 11 critical, in May Patch Tuesday
Patches include five vulnerabilities actively targeted in the wild, as well as two others with public exploit code available.
2025. május 14.
Biztonsági szemle
BayLISA and Cisco DevNet – Tech meetups in person and online
What happens when the sysadmin community meets a modern developer movement? BayLISA and DevNet, that’s what😎! What is BayLISA? BayLISA stands for Bay Area Large Installation System Administrators and is a user group of system and network...
2025. május 13.
Biztonsági szemle
Building Effective Security Programs Requires Strategy, Patience, and Clear Vision
Capital One executives share insights on how organizations should design their security programs, implement passwordless technologies, and reduce their attack surface.
Oldalszámozás
- Előző oldal ‹‹
- 246. oldal
- Következő oldal ››