Biztonsági szemle
![Russia flag is depicted on the screen with the program code. The concept of modern technology and site development.](/sites/default/files/styles/narrow_1x/public/feeds/c7/011924_russia_flag.jpg.webp?itok=_7DmXwyD)
2024. júl. 23.
Biztonsági szemle
Imposed sanctions against Cyber Army members repudiated by Russia
U.S. sanctions imposed against Russian state-backed hacktivist operation Cyber Army of Russia Reborn's leader Yuliya Pankratova and primary hacker Denis Degtyarenko for their involvement in critical infrastructure cyberattacks were dismissed by...
![](/sites/default/files/styles/narrow_1x/public/feeds/52/AdobeStock_521238327.jpg.webp?itok=n26K6xTu)
2024. júl. 23.
Biztonsági szemle
Ransomware crackdown increases cyber threat fragmentation
"This trend might also be perpetuated by the wider availability and increased quality of AI tools that lack prompt filtering, which cybercriminals can use to quickly assemble and debug their code," said Europol.
![computer screen with programming code and a skull, concept of computer security, malware or hacker attack (3d render)](/sites/default/files/styles/narrow_1x/public/feeds/a2/022624_malware.jpg.webp?itok=XWGC551W)
2024. júl. 23.
Biztonsági szemle
AsynRAT, BOINC deployed through SocGholish
Installation of AsyncRAT and BOINC occurs at the last part of the multi-stage attack, with the latter facilitating system information exfiltration after establishing a connection with a remote server.
![Telegram logo](/sites/default/files/styles/narrow_1x/public/feeds/0c/041723_telegram.jpg.webp?itok=WZHv65u9)
2024. júl. 23.
Biztonsági szemle
Video-spoofing malware distributed via Telegram for Android zero-day
Attackers behind the exploit may have leveraged Telegram API to create a payload masquerading as a 30-second video, which when clicked triggers a message suggesting the use of another player that includes an "Open" button that facilitates the...
![Google Cloud sign outside headquarters](/sites/default/files/styles/narrow_1x/public/feeds/eb/0714_google_cloud.jpg.webp?itok=lYo2mB0n)
2024. júl. 23.
Biztonsági szemle
Google Cloud exploited in FLUXROOT, PINEAPPLE attacks
FLUXROOT exploited Google Cloud container URLs to establish phishing pages distributing the Grandoreiro banking trojan, which proceeded to exfiltrate credentials from widely used LatAm online payments platform Mercado Pago.
![Coins Money](/sites/default/files/styles/narrow_1x/public/feeds/6b/pixabay-money-515058_640-1-1.jpg.webp?itok=cDSmx_Pb)
2024. júl. 23.
Biztonsági szemle
Sports sponsorships fuel Chinese cybercrime syndicate's operations
Illicit cyber activities conducted by Chinese cybercrime syndicate Vigorish Viper involving a sophisticated technology suite have been supported by the group's illegal betting platforms advertised by sports teams, including European football clubs...
![](/sites/default/files/styles/narrow_1x/public/feeds/bd/crowdstrike-microsoft.jpg.webp?itok=zUoC9nVJ)
2024. júl. 23.
Biztonsági szemle
More US agencies report CrowdStrike outage-related disruptions
At least 5,000 workstations at the U.S. Citizenship and Immigration Services have been taken down by the incident, which a source close to the matter notes may be resolved in over a week.
![DDoS attack](/sites/default/files/styles/narrow_1x/public/feeds/bd/1030_ddos.jpg.webp?itok=SE0gk_M1)
2024. júl. 23.
Biztonsági szemle
DigitalStress DDoS-for-hire operation dismantled
Aside from the disruption of DigitalStress' website, the law enforcement sting — which also involved the FBI and the Police Service of Northern Ireland — also resulted in the arrest of a suspected administrator, according to the UK's NCA.
![](/sites/default/files/styles/narrow_1x/public/feeds/9f/WEARE42.Still008-scaled.jpg.webp?itok=pD8-U6B5)
2024. júl. 23.
Biztonsági szemle
How a smart connected container shows how to find yourself in the future of shipping
Container 42, the smartest shipping container in the world, is a key example of how revolutionary smart technology is for the future! But what role does data, AI and cybersecurity play in this new digital landscape? Read this blog from our Cisco tech...
![](/sites/default/files/styles/narrow_1x/public/feeds/d1/1718183213072-scaled.jpg.webp?itok=RGm1lBbm)
2024. júl. 23.
Biztonsági szemle
Striking a Chord Between My Passions and Career at Cisco
Karthik R. overcame imposter syndrome to secure a consulting engineer internship, leading to a full-time position, where he rediscovered his passion for music.
![](/sites/default/files/styles/narrow_1x/public/feeds/80/Screenshot-2024-07-22-at-10.25.47%E2%80%AFAM-1024x474.png.webp?itok=V22ZPoil)
2024. júl. 23.
Biztonsági szemle
User Protection Suite Secures Against Talos Top Ransomware Attack Trends
Discover Talo’s first episode of Talos Threat Perspective and how Cisco’s User Protection Suite can provide a layered approach to security.
2024. júl. 23.
Biztonsági szemle
Hitachi Energy AFS/AFR Series Products
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: AFS650, AFS660, AFS665, AFS670, AFS675, AFS677, AFR677 Vulnerabilities: Type Confusion, Use After Free, Double Free...
Oldalszámozás
- Előző oldal ‹‹
- 10. oldal
- Következő oldal ››