Biztonsági szemle

2024. Aug. 13.
Biztonsági szemle
Open-source software analysis tools added by Endor Labs
The additional functions include analytics that assess the difficulty of upgrading an open-source software package and the potential risk of application disruption.

2024. Aug. 13.
Biztonsági szemle
EQT nabs majority share in Acronis
Acronis, which is based in Switzerland, offers the Cyber Protect Cloud platform, which assists managed service providers in safeguarding other organizations' IT infrastructure from cyber threats and backing up their critical data.

2024. Aug. 13.
Biztonsági szemle
Humans remain as key cloud security weak point
The report identified misconfiguration and inadequate change control as the leading cloud security threats followed by identity and access management issues, insecure interfaces and APIs, and poor execution of cloud security strategies -- all...

2024. Aug. 13.
Biztonsági szemle
Enhanced vulnerability disclosure rules for federal contractors sought by new legislation
Updates to the Federal Acquisition Regulation and Defense Federal Acquisition Regulation Supplement contract requirements should be conducted by the Office of Management and Budget and the Defense Secretary, respectively, to ensure contractors'...

2024. Aug. 13.
Biztonsági szemle
Ewon Cosy+ vulnerabilities could be targeted in root access attacks
Most serious of the identified vulnerabilities was the high-severity flaw CVE-2024-33892, which could be exploited to enable cookie-based information exposure, an analysis from SySS GmbH researchers presented at this year's DEF CON security...

2024. Aug. 13.
Biztonsági szemle
RCE, privilege escalation likely with chained OpenVPN flaws
Such flaws, tracked as CVE-2024-27459, CVE-2024-24974, and CVE-2024-27903, involved OpenVPN's openvpnserv component, while another flaw relating to the Windows TAP driver, tracked as CVE-2024-1305, could be leveraged to enable denial-of-service...

2024. Aug. 13.
Biztonsági szemle
Suspected ransomware intrusion affects Schlatter Industries
Despite not specifying the malware leveraged to compromise its IT network, Schlatter revealed in a statement that it has been blackmailed by its attackers, who are believed to be demanding monetary payment in exchange for a decryption tool and the...

2024. Aug. 13.
Biztonsági szemle
Evolution Mining's IT systems disrupted by ransomware attack
Such an intrusion against Evolution Mining, which has already been reported to the Australian Cyber Security Centre, comes months after Australian heavy rare earths mining firm Northern Minerals reported having its data exfiltrated and exposed...

2024. Aug. 13.
Biztonsági szemle
DARPA Aims to Ditch C Code, Move to Rust
The Defense Advanced Research Projects Agency launches TRACTOR program to work with university and industry researchers on creating a translation system that can turn C code into secure, idiomatic Rust code.

2024. Aug. 13.
Biztonsági szemle
What Happens When Your House Burns Down Right Before a Meeting?
Discover how the leadership and teamwork at Cisco rallied around Premium Services Specialist Amber R. when her house caught fire moments before a meeting.
2024. Aug. 13.
Biztonsági szemle
AVEVA SuiteLink Server
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: AVEVA Equipment: SuiteLink Server Vulnerability: Allocation of Resources Without Limits or Throttling 2. RISK EVALUATION Successful exploitation...
2024. Aug. 13.
Biztonsági szemle
Rockwell Automation Pavilion8
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: Pavilion8 Vulnerability: Missing Encryption of Sensitive Data 2. RISK EVALUATION Successful exploitation of this...
Oldalszámozás
- Előző oldal ‹‹
- 583. oldal
- Következő oldal ››