Biztonsági szemle
2024. Júl. 25.
Biztonsági szemle
Updated CISA exploited vulnerabilities catalog includes Internet Explorer, Twilio Authy bugs
Even though there has been no clear evidence indicating ongoing active exploitation of CVE-2012-4792, the vulnerability, which could enable remote execution of arbitrary code, had been leveraged in watering hole attacks deployed against Capstone...
2024. Júl. 25.
Biztonsági szemle
Nearly 57K impacted by Michigan Medicine hack
Infiltration of Michigan Medicine's employee email accounts on May 23 and 29 enabled the exfiltration of individuals' names, birthdates, addresses, medical record numbers, diagnostic and treatment details, and health insurance information, as well as...
2024. Júl. 25.
Biztonsági szemle
Alleged data breach denied by Bullhorn
While the exfiltrated data was claimed to contain two million records of users linked to firms leveraging Bullhorn, such information was noted by Bullhorn to have been obtained from a third party that integrated with the firm and has not impacted its...
2024. Júl. 25.
Biztonsági szemle
CrowdStrike outage attributed to update checker flaw
While IPC Template Instances delivered to the Falcon sensor via Rapid Response Content updates between March and April were thoroughly examined by CrowdStrike's Content Validator, one of the two other IPC Template Instances pushing the identification...
2024. Júl. 25.
Biztonsági szemle
How technology is being used to help support environmental conservation
This World Nature Conservation Day, we invite you to learn more about the impactful work that some of our nonprofit partners are doing in this area.
2024. Júl. 25.
Biztonsági szemle
Significant compromise possible with novel Google Cloud vulnerability
Such a security issue — which stems from the background creation of a Cloud Build service account and its default connection to a Cloud Build instance following Cloud Function creation or updating — could be leveraged by attackers to infiltrate other...
2024. Júl. 25.
Biztonsági szemle
Malware distribution service exploits thousands of GitHub accounts
Stargazer Goblin used such GitHub Ghost accounts to establish the legitimacy of hundreds of repositories touted to be for social media, gaming, and cryptocurrency, according to a Check Point Research report.
2024. Júl. 25.
Biztonsági szemle
CrowdStrike outage demonstrates how industry may respond to a Cyber Pearl Harbor
"While there were significant outages, disruption and loss of business, and an overall lack of system resilience, I am very encouraged overall by how everyone responded."
2024. Júl. 25.
Biztonsági szemle
Positron Broadcast Signal Processor
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Positron S.R.L Equipment: Broadcast Signal Processor TRA7005 Vulnerability: Authentication Bypass Using an...
2024. Júl. 25.
Biztonsági szemle
FBI, CISA, and Partners Release Advisory Highlighting North Korean Cyber Espionage Activity
Today, CISA—in partnership with the Federal Bureau of Investigation (FBI)—released a joint Cybersecurity Advisory, North Korea State-Sponsored Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs. The...
2024. Júl. 25.
Biztonsági szemle
Siemens SICAM Products
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT...
Oldalszámozás
- Előző oldal ‹‹
- 707. oldal
- Következő oldal ››