Biztonsági szemle

2024. Szep. 18.
Biztonsági szemle
Unsecured Elasticsearch cluster exposes over 3M vehicle records
Aside from containing vehicle owners' names, birthdates, and phone numbers, such an Elasticsearch cluster also featured vehicle production dates, chassis and engine numbers, and other records with a "special needs" designation, according to Cybernews...

2024. Szep. 18.
Biztonsági szemle
Accounting software targeted to breach construction sector
Almost 35,000 brute-force attempts have been conducted by threat actors against a single host's Microsoft SQL Server leveraged by the accounting software for database operations, according to researchers from Huntress.

2024. Szep. 18.
Biztonsági szemle
Temu refutes claim of extensive data compromise
While information in the stolen database, which has been peddled on BreachForums, was purported to include customers' full names, birthdates, gender, usernames and IDs, hashed passwords, phone numbers, shipping addresses, and IP addresses, Temu...

2024. Szep. 18.
Biztonsági szemle
Microsoft Azure tools increasingly leveraged in ransomware attacks
After installing dependencies and upgrading .NET to version 8, ransomware gangs leveraged several Azure Storage Explorer instances to accelerate uploads of stolen files to Azure Blob storage before being transferred to their storage, according to a...

2024. Szep. 18.
Biztonsági szemle
Routed Optical Networking Continues to Transform the Industry
Learn why Cisco Routed Optical Networking has been deployed by more than 200 customers who have increased capacity, reduced energy consumption, and lowered network costs complexity, and footprint.

2024. Szep. 18.
Biztonsági szemle
Infostealers: An Early Warning for Ransomware Attacks
Can cyber defenders use the presence of infostealers as a canary in the coal mine to preempt ransomware attacks?
2024. Szep. 18.
Biztonsági szemle
Apple Releases Security Updates for Multiple Products
Apple released security updates to address vulnerabilities in multiple Apple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the...
2024. Szep. 18.
Biztonsági szemle
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-27348 Apache HugeGraph-Server Improper Access Control Vulnerability CVE-2020-0618 Microsoft SQL Server...

2024. Szep. 18.
Biztonsági szemle
Python Infostealer Patching Windows Exodus App, (Wed, Sep 18th)
A few months ago, I wrote a diary[ 1] about a Python script that replaced the Exodus[ 2] Wallet app with a rogue one on macOS. Infostealers are everywhere these days. They target mainly browsers (cookies, credentials) and classic applications that...

2024. Szep. 18.
Biztonsági szemle
As Geopolitical Tensions Mount, Iran's Cyber Operations Grow
Increasing attacks by the OilRig/APT34 group linked to Iran's Ministry of Intelligence and Security show that the nation's capabilities are growing, and targeting regional allies and enemies alike.

2024. Szep. 18.
Biztonsági szemle
ISC Stormcast For Wednesday, September 18th, 2024 https://isc.sans.edu/podcastdetail/9142, (Wed, Sep 18th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Oldalszámozás
- Előző oldal ‹‹
- 495. oldal
- Következő oldal ››