Biztonsági szemle
2025. Aug. 12.
Biztonsági szemle
ShinyHunters Tactics Now Mirror Scattered Spider
There's growing evidence that two of arguably the most dangerous cybercrime groups out there are tag-teaming big targets.
2025. Aug. 12.
Biztonsági szemle
Empowering People, Enabling Progress: AI and the Workforce in Africa
Africa has immense potential to lead in the global AI economy. With the continent's dynamic, young workforce this is a moment for collective action to build digital infrastructure, expand AI education, and power innovation for a prosperous future.
2025. Aug. 12.
Biztonsági szemle
ISC Stormcast For Tuesday, August 12th, 2025 https://isc.sans.edu/podcastdetail/9566, (Tue, Aug 12th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. Aug. 11.
Biztonsági szemle
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
A swarm of US agencies joined with international partners to take down servers and domains and seize more than $1 million associated with BlackSuit (Royal) ransomware operations, a group that has been a chronic, persistent threat against critical...
2025. Aug. 11.
Biztonsági szemle
REvil Actor Accuses Russia of Planning 2021 Kaseya Attack
REvil affiliate Yaroslav Vasinskyi, who was convicted last year for his role in the 2021 Kaseya ransomware supply chain attack, said the Russian government was instrumental to the attack's execution.
2025. Aug. 11.
Biztonsági szemle
Black Hat NOC Expands AI Implementation Across Security Operations
Corelight's James Pope gave Dark Reading an inside look at this year's Black Hat Network Operations Center, detailing security challenges and rising trends — many related to increased AI use.
2025. Aug. 11.
Biztonsági szemle
Researchers Warn of 'Hidden Risks' in Passwordless Account Recovery
Passwordless authentication is becoming more common, but account recovery poses increased risks that can lead to account takeovers. It's especially dangerous because even low-skilled attackers can achieve success.
2025. Aug. 11.
Biztonsági szemle
Echo Chamber, Prompts Used to Jailbreak GPT-5 in 24 Hours
Researchers paired the jailbreaking technique with storytelling in an attack flow that used no inappropriate language to guide the LLM into producing directions for making a Molotov cocktail.
2025. Aug. 11.
Biztonsági szemle
Utilities, Factories at Risk From Encryption Holes in Industrial Protocol
The OPC UA communication protocol is widely used in industrial settings, but despite its complex cryptography, the open source protocol appears to be vulnerable in a number of different ways.
2025. Aug. 11.
Biztonsági szemle
Will Secure AI Be the Hottest Career Path in Cybersecurity?
Securing AI systems represents cybersecurity's next frontier, creating specialized career paths as organizations grapple with novel vulnerabilities, regulatory requirements, and cross-functional demands.
2025. Aug. 11.
Biztonsági szemle
Google Chrome Enterprise: Keeping Businesses Safe From Threats on the Web
Dark Reading's Terry Sweeney and Google Cloud Security's Jason Kemmerer discuss how organizations can secure the modern workplace with zero trust browser protection for remote and hybrid teams.
2025. Aug. 11.
Biztonsági szemle
How Maclaren Racing Gets From the Browser to the Track
In a conversation with Dark Reading's Terry Sweeney, Dr. Lisa Jarman from McLaren Racing says cutting-edge innovation must coexist with rigorous security protocols.
Oldalszámozás
- Előző oldal ‹‹
- 60. oldal
- Következő oldal ››