Biztonsági szemle
2024. augusztus 5.
Biztonsági szemle
How early adopters drive security innovation
While bringing on an early-adopter security tool presents some risk for a CISO, it’s often a good choice for the right organization.
2024. augusztus 5.
Biztonsági szemle
Microsoft Bounty Program Year in Review: $16.6M in Rewards
We are excited to announce that this year the Microsoft Bounty Program has awarded $16.6M in bounty awards to 343 security researchers from 55 countries, securing Microsoft customers in partnership with the Microsoft Security Response Center (MSRC)...
2024. augusztus 5.
Biztonsági szemle
Script obfuscation using multiple instances of the same function, (Mon, Aug 5th)
Threat actors like to make detection and analysis of any malicious code they create as difficult as possible â for obvious reasons. There are any number of techniques which they may employ in this area, nevertheless, the one approach, that is...
2024. augusztus 5.
Biztonsági szemle
ISC Stormcast For Monday, August 5th, 2024 https://isc.sans.edu/podcastdetail/9082, (Mon, Aug 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2024. augusztus 4.
Biztonsági szemle
OOXML Spreadsheets Protected By Verifier Hashes, (Sat, Aug 3rd)
When I wrote about the internal file format of protected spreadsheets, I mentioned a simple 16-bit hash for .xls files in diary entry " 16-bit Hash Collisions in .xls Spreadsheets" and a complex hash based on SHA256 for .xlsx files in diary entry "...
2024. augusztus 3.
Biztonsági szemle
Planning for Cisco Certification Exam Success
Plan your route to Cisco certification success with insights, tips, and advice from our experts.
2024. augusztus 2.
Biztonsági szemle
Ukraine steps up cyberwar with DDoS on Russian banks
Officials in Ukraine say they have concluded a week-long attack intended to hinder the financial system in Russia.
2024. augusztus 2.
Biztonsági szemle
Even Linux users should take a look at this Microsoft KB article., (Fri, Aug 2nd)
Secure boot has been a standard feature since at least Windows 8. As the name implies, the feature protects the boot process. The integrity of the boot process is ensured by digitally signing any software ("firmware") used during the boot process. As...
2024. augusztus 2.
Biztonsági szemle
Questions to ask before you shop for a consolidated security platform
There are many good reasons to adopt a consolidated security platform -- but there are also several things to consider before you take that step.
2024. augusztus 2.
Biztonsági szemle
Taco Bell AI, Azure, Scams, AI Emails, IBM, Crowdstrike, Aaran Leyland, and More... - SWN #403
2024. augusztus 2.
Biztonsági szemle
Fortune 50 Co. Pays Record-Breaking $75M Ransomware Demand
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to come.
2024. augusztus 2.
Biztonsági szemle
China's APT41 Targets Taiwan Research Institute for Cyber Espionage
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and related technologies.
Oldalszámozás
- Előző oldal ‹‹
- 730. oldal
- Következő oldal ››