Biztonsági szemle
2024. december 19.
Biztonsági szemle
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2
A newly discovered vulnerability, CVE-2024-53677, in the aging Apache framework is going to cause major headaches for IT teams, since patching isn't enough to fix it.
2024. december 19.
Biztonsági szemle
Bridging the 'Keyboard-to-Chair' Gap With Identity Verification
Modern identity verification (IDV) approaches aim to connect digital credentials and real-world identity without sacrificing usability.
2024. december 19.
Biztonsági szemle
Vendors Chase Potential of Non-Human Identity Management
Non-human identities authenticate machine-to-machine communication. The big challenge now is to secure their elements and processes — before attackers can intercept.
2024. december 19.
Biztonsági szemle
Malvertisers Fool Google With AI-Generated Decoy Content
Seemingly innocent "white pages," including an elaborate Star Wars-themed site, are bypassing Google's malvertising filters, showing up high in search results to lure users to second-stage phishing sites.
2024. december 19.
Biztonsági szemle
CISA Releases Draft of National Cyber Incident Response Plan
The draft of the long-awaited update to the NCIRP outlines the efforts, mechanisms, involved parties, and decisions the US government will use in response to a large-scale cyber incident.
2024. december 19.
Biztonsági szemle
Supply Chain Risk Mitigation Must Be a Priority in 2025
A balance of rigorous supplier validation, purposeful data exposure, and meticulous preparation is key to managing and mitigating risk.
2024. december 19.
Biztonsági szemle
Six environmental sustainability trends for 2025 and beyond
At Cisco, we are steadfast in our goals to both reduce environmental impact and foster resilience—ensuring that communities, ecosystems, and industries can adapt, thrive, and sustain themselves in the face of uncertainty. Learn about six...
2024. december 19.
Biztonsági szemle
How weaponized AI drives CISO burnout – and what to do about it
Existing tools bury analysts in data – we need a proactive approach focused on prevention, not just detection.
2024. december 19.
Biztonsági szemle
Schneider Electric Modicon Controllers
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon Controllers Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this...
2024. december 19.
Biztonsági szemle
Hitachi Energy SDM600
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.0 ATTENTION: Exploitable from adjacent network Vendor: Hitachi Energy Equipment: SDM600 Vulnerabilities: Origin Validation Error, Incorrect Authorization 2. RISK EVALUATION Successful exploitation of these...
2024. december 19.
Biztonsági szemle
Ossur Mobile Logic Application
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.6 ATTENTION: Low attack complexity Vendor: Ossur Equipment: Mobile Logic Application Vulnerabilities: Exposure of Sensitive System Information to an Unauthorized Control Sphere, Command Injection, Use of Hard...
2024. december 19.
Biztonsági szemle
Schneider Electric Accutech Manager
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Accutech Manager Vulnerability: Classic Buffer Overflow 2. RISK EVALUATION Successful exploitation could allow an...
Oldalszámozás
- Előző oldal ‹‹
- 509. oldal
- Következő oldal ››