Biztonsági szemle

2024. Aug. 8.
Biztonsági szemle
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.
2024. Aug. 8.
Biztonsági szemle
Dorsett Controls InfoScan
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Exploitable remotely/low attack complexity Vendor: Dorsett Controls Equipment: InfoScan Vulnerabilities: Exposure of Sensitive Information To An Unauthorized Actor, Path Traversal 2. RISK...
2024. Aug. 8.
Biztonsági szemle
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on August 8, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-221-01 Dorsett Controls InfoScan CISA...
2024. Aug. 8.
Biztonsági szemle
Best Practices for Cisco Device Configuration
In recent incidents, CISA has seen malicious cyber actors acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart Install feature. CISA recommends organizations disable Smart...

2024. Aug. 8.
Biztonsági szemle
ISC Stormcast For Thursday, August 8th, 2024 https://isc.sans.edu/podcastdetail/9088, (Thu, Aug 8th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2024. Aug. 8.
Biztonsági szemle
Ransomware gangs: How low will they go?
Ransomware operators are increasingly turning to new, and in some cases extremely concerning, tactics to extort payments from victims.

2024. Aug. 8.
Biztonsági szemle
Amid the glitter of Las Vegas, don’t forget the cybersecurity basics
The latest AI-enabled tools are enticing, but don’t lose focus on what’s really important as the show continues on.

2024. Aug. 8.
Biztonsági szemle
Black Hat USA: Wi-Fi tracking flaw puts the ‘BS’ in BSSID
Geolocation services for a number of popular mobile hardware vendors can be used to perform widescale Wi-Fi network monitoring.

2024. Aug. 8.
Biztonsági szemle
Hazy Issue in Entra ID Allows Privileged Users to Become Global Admins
Invisible authentication mechanisms in Microsoft allow any attacker to escalate from privileged to super-duper privileged in cloud environments, paving the way for complete takeover.

2024. Aug. 8.
Biztonsági szemle
Monitoring Changes in KEV List Can Guide Security Teams
The number of additions to the Known Exploited Vulnerabilities catalog is growing quickly, but even silent changes to already-documented flaws can help security teams prioritize.

2024. Aug. 7.
Biztonsági szemle
From Cybersecurity Practitioner to Advocacy: My Journey Back to Cisco
Discover Kyle Winters' journey from cybersecurity practitioner to Cisco technical advocate. Learn about his experiences, upcoming tutorials, and how to engage with the community.

2024. Aug. 7.
Biztonsági szemle
CrowdStrike Will Give Customers Control Over Falcon Sensor Updates
The security vendor has also implemented several changes to protect against the kind of snafu that crashed 8.5 million Windows computers worldwide last month.
Oldalszámozás
- Előző oldal ‹‹
- 594. oldal
- Következő oldal ››