Biztonsági szemle

2025. Aug. 27.
Biztonsági szemle
China Hijacks Captive Portals to Spy on Asian Diplomats
The Mustang Panda APT is hijacking Google Chrome browsers when they attempt to connect to new networks and redirecting them to phishing sites.

2025. Aug. 27.
Biztonsági szemle
Google: Salesforce Attacks Stemmed From Third-Party App
A group tracked as UNC6395 engaged in "widespread data theft" via compromised OAuth tokens from a third-party app called Salesloft Drift.

2025. Aug. 27.
Biztonsági szemle
In-Demand Skills for the Modern Network Engineer
How can I make sure my skills stay relevant in my industry? What skills are most in-demand for the job I have now – and the job I want in three years? At Learn with Cisco, these are the questions we hear all the time. And advances in AI put pressure...

2025. Aug. 27.
Biztonsági szemle
Storm-0501 Hits Enterprise With 'Cloud-Based Ransomware' Attack
The financially motivated threat group used cloud resources to conduct a complex, ransomware-style attack against an enterprise victim.

2025. Aug. 27.
Biztonsági szemle
CVE-2025-40779: Kea crash upon interaction between specific client options and subnet selection
CVE: CVE-2025-40779 Title: Kea crash upon interaction between specific client options and subnet selection Document version: 2.0 Posting date: 27 August 2025 Program impacted: Kea Versions affected: Kea 2.7.1 -> 2.7.9 3.0.0 3.1.0 Versions NOT...

2025. Aug. 27.
Biztonsági szemle
AI-Powered Ransomware Has Arrived With 'PromptLock'
Researchers raise the alarm that a new, rapidly evolving ransomware strain uses an OpenAI model to render and execute malicious code in real time, ushering in a new era of cyberattacks against enterprises.

2025. Aug. 27.
Biztonsági szemle
Gaps in California Privacy Law: Half of Data Brokers Ignore Requests
Failure to comply with consumer data access and deletion requests highlights the urgent need for standardized verification processes and stronger enforcement mechanisms to protect consumer privacy.

2025. Aug. 27.
Biztonsági szemle
Get Ahead of the HIPAA Security Rule Update With Secure Workload
Cisco Secure Workload is foundational for organizations seeking to implement an effective microsegmentation strategy. It empowers orgs to safeguard assets.

2025. Aug. 27.
Biztonsági szemle
African Law Enforcement Agencies Nab Cybercrime Syndicates
African nations work with Interpol and private-sector partners to disrupt cybercriminal operations on the continent, but more work needs to be done.

2025. Aug. 27.
Biztonsági szemle
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
In most attack scenarios, attackers have to perform a crucial operation: to load a shellcode in memory and execute it. This is often performed in a three-step process:

2025. Aug. 27.
Biztonsági szemle
ISC Stormcast For Wednesday, August 27th, 2025 https://isc.sans.edu/podcastdetail/9588, (Wed, Aug 27th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Aug. 26.
Biztonsági szemle
When One Hospital Gets Ransomware, Others Feel the Pain
Without key security defenses, including backup recovery and multifactor authentication implementation, all parties, including neighboring hospitals and patients, suffer.
Oldalszámozás
- Előző oldal ‹‹
- 4. oldal
- Következő oldal ››