Biztonsági szemle

2024. nov. 21.
Biztonsági szemle
Ransomware attacks primarily caused by poor cyber hygiene
Aside from primarily leveraging basic usernames for their accounts, organizations impacted by ransomware intrusions from July to September — including those in the government and healthcare industries — also mostly failed to implement multi-factor...

2024. nov. 21.
Biztonsági szemle
Misconfigured Forces Penpals server leaks over 1.1M users' data
Data within the unsecured database included military personnel and their supporters' full names, images, mailing addresses, locations, images, Social Security numbers, and National Insurance numbers, a report by cybersecurity researcher Jeremy Fowler...

2024. nov. 21.
Biztonsági szemle
Senate panel OKs several cybersecurity bills
Numerous cybersecurity-related measures have been advanced by the Senate Homeland Security and Governmental Affairs Committee, led by the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2024, which would mandate the adoption of...

2024. nov. 21.
Biztonsági szemle
Phobos ransomware operation uncovered by indictment against suspected admin
Included in the Phobos-hit organizations that paid a ransom were a California public school system, a North Carolina children's hospital, a Maryland-based accounting and consulting service provider, and health organizations in Pennsylvania and...

2024. nov. 21.
Biztonsági szemle
Most prevalent, menacing software vulnerabilities ranked by MITRE
MITRE has regarded cross-site scripting flaws as the most common and severe software vulnerabilities this year, followed by out-of-bounds write, SQL injection, cross-site request forgery, and path traversal issues.

2024. nov. 21.
Biztonsági szemle
Novel NFC-exploiting Ghost Tap attack technique gains traction
Attacks involving Ghost Tap commence with the compromise of payment card data and one-time passwords for virtual wallets, which are then delivered by a relay server to money mules who could withdraw the funds without being easily detected...

2024. nov. 21.
Biztonsági szemle
Telcos subjected to Chinese cyberespionage intrusions
Intrusions by Liminal Panda, which had some components resembling those leveraged in LightBasin attacks, involved the utilization of the SIGTRANslator Linux ELF binary, network-scanning CordScan utility, and the PingPong backdoor, according to an...

2024. nov. 21.
Biztonsági szemle
Cybersecurity Is Critical, but Breaches Don't Have to Be Disasters
The future of cybersecurity isn't about preventing every breach — it's about learning and growing stronger with each attack.

2024. nov. 21.
Biztonsági szemle
Publicly available life cycle assessments document our products’ environmental impact
We are excited to announce that Cisco is now publishing life cycle assessments (LCAs) for some of our hardware products.

2024. nov. 21.
Biztonsági szemle
How Can PR Protect Companies During a Cyberattack?
When a cybersecurity incident occurs, it's not just IT systems and data that are at risk — a company's reputation is on the line, too.

2024. nov. 21.
Biztonsági szemle
Preserving Culture Through Technology: An Unforgettable Experience in the Arctic
Security Engineering Technical Leader Alice S. shares her experience representing her Native culture while supporting IỊisaġvik College and the Iñupiaq Alaska Native Tribe in the Arctic.

2024. nov. 21.
Biztonsági szemle
Cisco Secure Workload: Leading in Segmentation Maturity
As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality...
Oldalszámozás
- Előző oldal ‹‹
- 279. oldal
- Következő oldal ››