Biztonsági szemle
2024. nov. 1.
Biztonsági szemle
Developer Velocity & Security: Can You Get Out of the Way in Time?
When a CISO can articulate risk in context to the business as a whole, development teams can better prioritize their activities.
2024. nov. 1.
Biztonsági szemle
Microsoft Recall launch postponed anew
Such postponement comes after Recall was subjected to several delays since June due to security concerns associated with the feature, which has since been allayed by Microsoft with its assurances of an opt-in experience, a completely encrypted...
2024. nov. 1.
Biztonsági szemle
About 87K compromised in Mystic Valley Elder Services breach
Infiltration of systems belonging to Mystic Valley, which caters to older adults and people with disabilities, have enabled the exfiltration of names, birthdates, Social Security numbers, payment card and financial account numbers, passport numbers...
2024. nov. 1.
Biztonsági szemle
Tougher export controls for US tech sought
The U.S. Commerce Department has been urged by Sen. Ron Wyden, D-Ore., to bolster the already robust proposed U.S. tech rules that would prevent the utilization of the country's surveillance tools in repressive countries amid concerns of potential...
2024. nov. 1.
Biztonsági szemle
Serious WordPress compromise likely with LiteSpeed Cache plugin bug
Such a vulnerability, which arises from an insufficient security hash check vulnerable to brute-forcing, could be successfully abused with the activation of certain configurations within the plugin's crawler feature.
2024. nov. 1.
Biztonsági szemle
Active exploitation of PTZOptics zero-days underway
Attacks exploiting the authentication weakness within the 'lighthttpd' server, tracked as CVE-2024-8957, and the insufficient input sanitization bug, tracked as CVE-2024-8957, could enable camera hijacking and bot compromise, as well as further...
2024. nov. 1.
Biztonsági szemle
Supply chain attack compromises LottieFiles npm package with crypto drainer
Such an intrusion has prompted automated delivery of the malicious lottie-player NPM package versions among users who obtained the library through third-party content delivery networks.
2024. nov. 1.
Biztonsági szemle
New attack techniques utilized by Iranian cyber group Emennet Pasargad
Iranian cyber operation Emennet Pasargad was noted by the FBI, Department of Treasury, and the Israel National Cyber Directorate to have leveraged updated tradecraft, such as IP camera breaches and generative artificial intelligence, in recent...
2024. nov. 1.
Biztonsági szemle
Novel Xiū gǒu phishing kit has global reach
Attacks involved the use of Rich Communication Services messages indicating false payments that included links redirecting to websites spoofing government agencies, postal services, and banking entities, including the U.S. Postal Service, Linkt, and...
2024. nov. 1.
Biztonsági szemle
Quad7 botnet-compromised credentials tapped by various Chinese hackers
After Quad7's successful exfiltration of targeted systems' passwords through a limited number of sign-in attempts meant to evade detection, Storm-0940 immediately utilized the stolen credentials to breach networks, conduct credential dumping, and...
2024. nov. 1.
Biztonsági szemle
The Overlooked Importance of Identifying Riskiest Users
"See one, teach one, do one" takes a page out of the healthcare playbook to reduce human vulnerabilities where they matter most in cybersecurity.
Oldalszámozás
- Előző oldal ‹‹
- 45. oldal
- Következő oldal ››