Biztonsági szemle
![<p>Credit: U.S. Cyber Command</p>](/sites/default/files/styles/narrow_1x/public/feeds/d9/us-cyber-command.jpg.webp?itok=SbYgb3zT)
2024. jún. 5.
Biztonsági szemle
More proactive cybersecurity urged for US, allies
Offensive cyber operations below the threshold of armed conflict were noted by U.S. Cyber Command Senior Strategist Emily Goldman to have been strategically undermining the U.S. and its allies and partners as adversaries become emboldened to deploy...
![Malware analysis](/sites/default/files/styles/narrow_1x/public/feeds/f2/0816_malware.jpg.webp?itok=u1I2LnSP)
2024. jún. 5.
Biztonsági szemle
Stealthier DarkGate malware campaign emerges
Attacks with the DarkGate malware-as-a-service operation have since involved an AutoHotKey script instead of AutoIt ones to facilitate the stealthier distribution of the malware, according to The Hacker News.
![Diversity identity and privacy concept and personal private data symbol as diverse finger prints or fingerprint icons and census population in a 3D illustration style.](/sites/default/files/styles/narrow_1x/public/feeds/d0/012624_fingerprint.jpg.webp?itok=YdwIopLF)
2024. jún. 5.
Biztonsági szemle
Code42 seeks to bolster insider threat defenses
More robust protections against insider threats are being aimed by insider risk management provider Code42 Software with a new integration and workflow for its cloud-based data protection offering Incidyr Flows, SiliconAngle reports.
![neon cloud computing technology concept, illustration.](/sites/default/files/styles/narrow_1x/public/feeds/ae/020924_cloud_computing.jpg.webp?itok=hPxjF0ew)
2024. jún. 5.
Biztonsági szemle
Malicious use of BoxedApp tool on the rise
App virtualization tool BoxedApp has been increasingly leveraged to facilitate the distribution of malicious payloads while bypassing static analysis during the past year, with threat actors particularly exploiting the tool's virtual storage, virtual...
![An "Emergency" Sign in front of a hospital in the early evening](/sites/default/files/styles/narrow_1x/public/feeds/d9/030524_emergency_entrance_hospital.jpg.webp?itok=HgrYQnWG)
2024. jún. 5.
Biztonsági szemle
Report: Severe ransomware impact most likely in rural hospitals
U.S. rural hospitals, most of which are critical access, were noted by a report from the Cyberspace Solarium Commission 2.0 to be most vulnerable to ransomware attacks due to their dependence on outdated software and lacking cybersecurity funding...
![](/sites/default/files/styles/narrow_1x/public/feeds/92/021224_ransomware.jpg.webp?itok=Q3vOUam5)
2024. jún. 5.
Biztonsági szemle
Data breach confirmed by Northern Minerals after BianLian leak
BleepingComputer reports that Australian heavy rare earths mining firm Northern Minerals has disclosed having its data stolen and exposed on the dark web following a cyberattack against its systems in late March.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
2024. jún. 5.
Biztonsági szemle
Brute Force Attacks Against Watchguard VPN Endpoints, (Wed, Jun 5th)
If you have a pulse and work in information security (or are a new scraping script without a pulse), you have probably seen reports of attacks against VPN endpoints. Running any VPN without strong authentication has been negligent for years, but in...
![Computer keyboard mail](/sites/default/files/styles/narrow_1x/public/feeds/9b/1002_email.jpg.webp?itok=ikXKaF9o)
2024. jún. 5.
Biztonsági szemle
Impact of suspected state-backed attack against British Columbia detailed
Canadian province British Columbia had 22 government email inboxes compromised following a suspected state-sponsored cyberattack that commenced in April, which exposed information from nearly 20 individuals, reports The Record, a news site by...
![](/sites/default/files/styles/narrow_1x/public/feeds/47/Remote_%D0%95%D0%B2%D0%B3%D0%B5%D0%BD%D0%B8%D1%8F_%D0%9C%D0%B0%D1%82%D0%B2%D0%B5%D0%B5%D1%86_Alamy.jpg.webp?itok=Gzteq4tM)
2024. jún. 5.
Biztonsági szemle
Remote Work's Hidden Dangers
Ten cybersecurity strategies for enterprises to keep remote work safer.
![AI security risks](/sites/default/files/styles/narrow_1x/public/feeds/1b/041624_big_data_ai.jpg.webp?itok=GjgL-_Lc)
2024. jún. 5.
Biztonsági szemle
Five AI-based threats security pros need to understand
In the first part of a two-part series on emerging cybersecurity trends, SC Media columnist Callie Guenther explains the five leading AI-based threats facing all security teams.
Oldalszámozás
- Előző oldal ‹‹
- 99. oldal
- Következő oldal ››