Biztonsági szemle
2024. október 15.
Biztonsági szemle
ISC Stormcast For Tuesday, October 15th, 2024 https://isc.sans.edu/podcastdetail/9180, (Tue, Oct 15th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2024. október 15.
Biztonsági szemle
Southeast Asian Cybercrime Profits Fuel Shadow Economy
With cybercriminal gangs raking in at least $18 billion regionally — and much more globally — law enforcement and policymakers are struggling to keep up as the syndicates innovate and entrench themselves in national economies.
2024. október 15.
Biztonsági szemle
Serious Adversaries Circle Ivanti CSA Zero-Day Flaws
Suspected nation-state actors are spotted stringing together three different zero-days in the Ivanti Cloud Services Application to gain persistent access to a targeted system.
2024. október 14.
Biztonsági szemle
Pentagon shares new cybersecurity rules for government contractors
The DOD introduced new cybersecurity requirements for companies that contract with the federal government.
2024. október 14.
Biztonsági szemle
Pokémon Gaming Company Employee Info Leaked in Hack
The gaming company reports that the server has been rebuilt after the leak, but has not confirmed if its insider video game data was leaked.
2024. október 14.
Biztonsági szemle
The Lingering 'Beige Desktop' Paradox
Organizations are grappling with the risks of having outdated hardware handling core workloads, mission-critical applications no one knows how to update or maintain, and systems that IT and security teams don't know about.
2024. október 14.
Biztonsági szemle
Microsoft: Schools Grapple With Thousands of Cyberattacks Weekly
Education, including K-12 schools and universities, has become the third most targeted sector due to the high variety of sensitive data it stores in its databases.
2024. október 14.
Biztonsági szemle
Vulnerable instances of Log4j still being used nearly 3 years later
Critical vulnerabilities take over 500 days to be fixed.
2024. október 14.
Biztonsági szemle
Command-jacking used to launch malicious code on open-source platforms
Attackers hijack legitimate commands and run malicious code to launch supply chain attacks.
2024. október 14.
Biztonsági szemle
ConfusedPilot Attack Can Manipulate RAG-Based AI Systems
Attackers can introduce a malicious document in systems such as Microsoft 365 Copilot to confuse the system, potentially leading to widespread misinformation and compromised decision-making processes.
2024. október 14.
Biztonsági szemle
Fighting Crime With Technology: Safety First
By combining human and nonhuman identity management in one solution, Flock Safety is helping law enforcement solve an impressive number of criminal cases every day.
2024. október 14.
Biztonsági szemle
Why Your Identity Is the Key to Modernizing Cybersecurity
Ultimately, the goal of creating a trusted environment around all digital assets and devices is about modernizing the way you do business.
Oldalszámozás
- Előző oldal ‹‹
- 585. oldal
- Következő oldal ››