Vendors' News

Vendor announcements

A Deep Dive Into Attempted Exploitation of CVE-2023-33538 
  

A Deep Dive Into Attempted Exploitation of CVE-2023-33538 

CVE-2023-33538 allows for command injection in TP-Link routers. We discuss exploitation attempts with payloads characteristic of Mirai botnet malware. The

Frontier AI Reinforces the Future of Modern Cyber Defense 
  

Frontier AI Reinforces the Future of Modern Cyber Defense 

As OpenAI and Anthropic advance frontier AI, SentinelOne delivers AI-native, machine-speed cyber defense at global scale.SentinelOneRead More

Building your cryptographic inventory: A customer strategy for cryptographic posture management 
  

Building your cryptographic inventory: A customer strategy for cryptographic posture management 

Learn how to build a comprehensive cryptographic inventory and strengthen quantum‑safe readiness using Microsoft Security tools, best‑practice lifecycle models, and

Attackers Actively Exploiting Critical Vulnerability in Ninja Forms – File Upload Plugin 
  

Attackers Actively Exploiting Critical Vulnerability in Ninja Forms – File Upload Plugin 

On April 6th, 2026, we publicly disclosed a critical Arbitrary File Upload vulnerability in Ninja Forms – File Upload, a

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026) 
  

Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026) 

Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise 
  

Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise 

The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North Korean threat actor Sapphire

Artifacts: versioned storage that speaks Git 
  

Artifacts: versioned storage that speaks Git 

Give your agents, developers, and automations a home for code and data. We’ve just launched Artifacts: Git-compatible versioned storage built

AI Search: the search primitive for your agents 
  

AI Search: the search primitive for your agents 

AI Search is the search primitive for your agents. Create instances dynamically, upload files, and search across instances with hybrid

Deploy Postgres and MySQL databases with PlanetScale + Workers 
  

Deploy Postgres and MySQL databases with PlanetScale + Workers 

Learn how to deploy PlanetScale Postgres and MySQL databases via Cloudflare and connect Cloudflare Workers.The Cloudflare BlogRead More

Cloudflare Email Service: now in public beta. Ready for your agents 
  

Cloudflare Email Service: now in public beta. Ready for your agents 

Agents are becoming multi-channel. That means making them available wherever your users already are — including the inbox. Today, Cloudflare

Building the foundation for running extra-large language models 
  

Building the foundation for running extra-large language models 

We built a custom technology stack to run fast large language models on Cloudflare’s infrastructure. This post explores the engineering

Cloudflare’s AI Platform: an inference layer designed for agents 
  

Cloudflare’s AI Platform: an inference layer designed for agents 

We’re building AI Gateway into a unified inference layer for AI, letting developers call models from 14+ providers. New features

BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory 
  

BlobPhish: The Phantom Phishing Campaign Hiding in Browser Memory 

ANY.RUN has observed a sustained surge in a credential-phishing campaign active since 2024. This campaign, dubbed BlobPhish, introduces a sneaky twist: instead of delivering phishing

  

Beyond the breach: inside a cargo theft actor’s post-compromise playbook 

Key findings Proofpoint monitored a cargo theft actor’s post‑compromise activity for more than a month in a decoy environment operated by Deception.pro.  The attacker abused multiple

Securing the UK’s Digital Future 
  

Securing the UK’s Digital Future 

Palo Alto Networks reaffirms its deep commitment to UK digital security, ensuring data autonomy, resilience and control for British organizations.

  

Identity Protection in the AI Era 

Enterprises aiming to predict and mitigate human, machine, and AI‑agent risks at scale demand AI‑powered identity‑first security without compromise.Trend Micro

Latest

 

Mobilhálózatok kritikus kínai moduljai

A Demokráciák Védelméért Alapítvány (FDD) új elemzése arra figyelmeztet, hogy a kínai gyártású mobilhálózati modulok tömeges jelenléte az amerikai kritikus

Mobilhálózatok kritikus kínai moduljai

A Demokráciák Védelméért Alapítvány (FDD) új elemzése arra figyelmeztet, hogy a kínai gyártású mobilhálózati modulok tömeges jelenléte az amerikai kritikus

Microsoft’s Windows Recall still allows silent data extraction

Microsoft’s Windows Recall still allows silent data extraction

Microsoft’s Windows Recall feature remains vulnerable to complete data extraction despite a major security overhaul, according to a cybersecurity researcher

Orosz C2 infrastruktúra azonosítása

A Hunt.io elemzés egy orosz rosszindulatú infrastruktúra feltérképezését mutatja be. A kutatás során több mint 1 250 aktív C2 szervert azonosítottak, amelyek 165

Don’t hold your breath on a truly European NATO

Don’t hold your breath on a truly European NATO

Every few years, like clockwork, the idea resurfaces from the salons of Brussels and the op-ed pages of Le Monde and Der Spiegel:

Claude Mythos Preview demonstrates advanced cybersecurity capabilities

Claude Mythos Preview demonstrates advanced cybersecurity capabilities

AISI found latest Mythos Preview successfully completing expert-level CTF tasksUKAuthority.com – The leading independent publisher of public sector technology news….Read

  

Incident response for AI: Same fire, different fuel 

AI changes how incidents unfold and how we respond. Learn which IR practices still apply and where new telemetry, tools,

Spotting cyberthreats: a guide for blind and low-vision users | Kaspersky official blog 
  

Spotting cyberthreats: a guide for blind and low-vision users | Kaspersky official blog 

Learn how Be My Eyes assists visually impaired users, whether it can truly stop phishing, and the key security measures

Add voice to your agent 
  

Add voice to your agent 

An experimental voice pipeline for the Agents SDK enables real-time voice interactions over WebSockets. Developers can now build agents with

Threat landscape for industrial automation systems in Q4 2025 
  

Threat landscape for industrial automation systems in Q4 2025 

The report contains industrial threat statistics for Q4 2025. It covers various infection vectors and malware types, as well as

Project Think: building the next generation of AI agents on Cloudflare 
  

Project Think: building the next generation of AI agents on Cloudflare 

Announcing a preview of the next edition of the Agents SDK — from lightweight primitives to a batteries-included platform for

Rearchitecting the Workflows control plane for the agentic era 
  

Rearchitecting the Workflows control plane for the agentic era 

Cloudflare Workflows, a durable execution engine for multi-step applications, now supports higher concurrency and creation rate limits through a rearchitectured

Introducing Agent Lee – a new interface to the Cloudflare stack 
  

Introducing Agent Lee – a new interface to the Cloudflare stack 

Agent Lee is an in-dashboard agent that shifts Cloudflare’s interface from manual tab-switching to a single prompt. Using sandboxed TypeScript,

Browser Run: give your agents a browser 
  

Browser Run: give your agents a browser 

Browser Rendering is now Browser Run, with Live View, Human in the Loop, CDP access, session recordings, and 4x higher

  

Register domains wherever you build: Cloudflare Registrar API now in beta 

The Cloudflare Registrar API is now in beta. Developers and AI agents can search, check availability, and register domains at

  

Identity, browsers, and node.js: Everything you missed in the Threat Detection Report miniseries 

Get cliff notes from our three-part deep dive into the 2026 Threat Detection Report and watch every episode, on demand

  

Introducing Region Meshes: Visualising Intra-Region Routing Paths 

Region Meshes is a new RIPE Atlas tool that visualises intra-region routing paths, showing where traffic stays local, where it

Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness 
  

Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness 

In Chile, cybersecurity compliance is becoming an operational issue, not just a legal one. Under the new Cybersecurity Framework Law,

  

Noisy Routers: Investigating the Make-Up of Route Collector Data 

Analysis of 80B+ BGP updates shows repeated “noise” is highly concentrated in a small set of peers, sessions, and prefixes,

Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack 
  

Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack 

On April 9, 2026, cpuid.com was actively serving malware through its own official download button. Threat actors had compromised the

Three Rowhammer attacks targeting GDDR6 | Kaspersky official blog 
  

Three Rowhammer attacks targeting GDDR6 | Kaspersky official blog 

GDDRHammer, GeForge, and GPUBreach: three new research papers on Rowhammer attacks with major security implications.Kaspersky official blogRead More

  

The Top 12 Free Threat Intelligence Feeds to Follow in 2026 

Finding the best threat intelligence feeds is about finding the right mix of coverage, context, and operational value.  In this

  

New: Use response actions to update Zscaler policies and block threats 

A new integration gives teams an easy way to update Zscaler Internet Access (ZIA) network policies using Red Canary response

Securing non-human identities: automated revocation, OAuth, and scoped permissions 
  

Securing non-human identities: automated revocation, OAuth, and scoped permissions 

Cloudflare is introducing scannable API tokens, enhanced OAuth visibility, and GA for resource-scoped permissions. These tools help developers implement a

Secure private networking for everyone: users, nodes, agents, Workers — introducing Cloudflare Mesh 
  

Secure private networking for everyone: users, nodes, agents, Workers — introducing Cloudflare Mesh 

Cloudflare Mesh provides secure, private network access for users, nodes, and autonomous AI agents. By integrating with Workers VPC, developers

Managed OAuth for Access: make internal apps agent-ready in one click 
  

Managed OAuth for Access: make internal apps agent-ready in one click 

Managed OAuth for Cloudflare Access helps AI agents securely navigate internal applications. By adopting RFC 9728, agents can authenticate on

Scaling MCP adoption: Our reference architecture for simpler, safer and cheaper enterprise deployments of MCP 
  

Scaling MCP adoption: Our reference architecture for simpler, safer and cheaper enterprise deployments of MCP 

We share Cloudflare’s internal strategy for governing MCP using Access, AI Gateway, and MCP server portals. We also launch Code

When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT 
  

When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying Remcos RAT 

Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now

Attackers Actively Exploiting Critical Vulnerability in Kali Forms Plugin 
  

Attackers Actively Exploiting Critical Vulnerability in Kali Forms Plugin 

On March 2nd, 2026, we received a submission through our Bug Bounty Program for a Remote Code Execution vulnerability in

15 Incident Response Metrics for the Modern SOC Team 
  

15 Incident Response Metrics for the Modern SOC Team 

If you run a SOC, you already know the feeling: alerts stack up fast, priorities collide, and leadership wants answers

Security’s Blind Spot: Physical Keyloggers That Bypass Antivirus Entirely 
  

Security’s Blind Spot: Physical Keyloggers That Bypass Antivirus Entirely 

Keyloggers: A Persistent Threat Nowadays, virtually all digital services rely on logins and authentication, from email inboxes to help desks.

Cloudflare targets 2029 for full post-quantum security 
  

Cloudflare targets 2029 for full post-quantum security 

Recent advances in quantum hardware and software have accelerated the timeline on which quantum attack might happen. Cloudflare is responding

  

SOC Case Management: A Practical Guide to Getting It Right 

SOC case management turns a flood of disconnected alerts into a structured investigation process. Done right, it helps a security

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox 
  

Cracks in the Bedrock: Escaping the AWS AgentCore Sandbox 

Unit 42 uncovers critical vulnerabilities in Amazon Bedrock AgentCore’s sandbox, demonstrating DNS tunneling and credential exposure. The post Cracks in

Hardening security management console settings | Kaspersky official blog 
  

Hardening security management console settings | Kaspersky official blog 

A complete checklist for strengthening security in the Kaspersky Security Center console.Kaspersky official blogRead More

  

Operating a Data Center with a Small Team: Engineering Lessons from Central Asia 

Managing ~600 infrastructure devices with a three-person team demands careful design choices. Based on experience in Central Asia, this article

Financial cyberthreats in 2025 and the outlook for 2026 
  

Financial cyberthreats in 2025 and the outlook for 2026 

In this report, Kaspersky experts share their insights into the 2025 financial threat landscape, including regional statistics and trends in

Building Phishing Detection That Works: 3 Steps for CISOs  
  

Building Phishing Detection That Works: 3 Steps for CISOs  

90% of attacks start with phishing. For CISOs, the real pain begins when the SOC cannot quickly tell whether a suspicious alert is just noise

  

From bytecode to bytes: automated magic packet generation 

By applying symbolic execution and the Z3 theorem prover to BPF bytecode, we’ve automated the generation of malware trigger packets,

  

AI in cybersecurity: The good, the bad, and the FUD 

The 2026 Threat Detection Report surveys the AI landscape for both defenders and adversaries. Here’s how you can stay ahead.Red

Announcing ADEM Universal Agent 
  

Announcing ADEM Universal Agent 

The ADEM Universal Agent for Prisma Access unifies network data across branch sites to fuel agentic autonomous operations. Get full-stack

  

The CISO’s Guide to Preventing Phishing Attacks 

Phishing remains one of the most persistent cyber threats facing enterprise organizations. Despite investment in perimeter defenses, identity protection, and

Cracks in the Bedrock: Agent God Mode 
  

Cracks in the Bedrock: Agent God Mode 

Unit 42 reveals “Agent God Mode” in Amazon Bedrock AgentCore. Broad IAM permissions lead to privilege escalation and data exfiltration

  

U.S. Public Sector Under Siege: Threat Intelligence for Q1 2026 

The first quarter of 2026 has reinforced a hard truth: U.S. government agencies and educational institutions are operating in the

The long road to your crypto: ClipBanker and its marathon infection chain 
  

The long road to your crypto: ClipBanker and its marathon infection chain 

Threat actors are distributing a Trojan disguised as Proxifier software; through a multi-stage infection chain, it delivers ClipBanker – malware

Fake BTS ARIRANG tour tickets: K-pop fans being targeted by scammers | Kaspersky official blog 
  

Fake BTS ARIRANG tour tickets: K-pop fans being targeted by scammers | Kaspersky official blog 

A BTS comeback and world-tour announcement has resulted in a new wave of scam campaigns. Kaspersky experts have discovered fraudulent

How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing 
  

How Phishing Is Targeting Germany’s Economy: Active Threats from Finance to Manufacturing 

Germany’s economy is a precision machine: finance fuels it, manufacturing builds it, telecom connects it, IT optimizes it, and healthcare sustains it. The

Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk 
  

Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk 

A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers

Edge Decay: How a Failing Perimeter Is Fueling Modern Intrusions 
  

Edge Decay: How a Failing Perimeter Is Fueling Modern Intrusions 

Edge devices are prime targets — learn how attackers exploit the perimeter to gain access, persist, and pivot to identity.SentinelOneRead

Release Highlights: VMRay Platform 2026.2.0 
  

Release Highlights: VMRay Platform 2026.2.0 

Introduction April is a season of fresh starts, and at VMRay, that means another powerful Platform release. Whether it’s the

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees 
  

Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees 

Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755,

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 30, 2026 to April 5, 2026) 
  

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 30, 2026 to April 5, 2026) 

Last week, there were disclosed in that have been added to the Wordfence Intelligence Vulnerability Database, and there were that

Protecting Cookies with Device Bound Session Credentials 
  

Protecting Cookies with Device Bound Session Credentials 

Posted by Ben Ackerman, Chrome team, Daniel Rubery, Chrome team and Guillaume Ehinger, Google Account Security team Following our April

Making AI Trustworthy and Observable in Real-Time: Cisco Announces Intent to Acquire Galileo 
  

Making AI Trustworthy and Observable in Real-Time: Cisco Announces Intent to Acquire Galileo 

Cisco announces the intent to acquire Galileo, a dynamic player in the observability for AI space that is helping make

The agentic SOC—Rethinking SecOps for the next decade 
  

The agentic SOC—Rethinking SecOps for the next decade 

In the SOC of the future, autonomous defense moves at machine speed, agents add context and coordination, and humans focus

The Good, the Bad and the Ugly in Cybersecurity – Week 15 
  

The Good, the Bad and the Ugly in Cybersecurity – Week 15 

FBI disrupts GRU router hijacking operation, ClickFix sidesteps Apple’s Terminal mitigation, and Iranian actors exploit PLCs across U.S. infrastructure.SentinelOneRead More

  

How to Reduce Cybersecurity False Positives in Your Organization 

False positives drain time, blur priorities, and make it harder for security teams to spot what actually matters. A noisy

  

Bringing Rust to the Pixel Baseband 

Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have

The Increasing Role of AI in Vulnerability Research 
  

The Increasing Role of AI in Vulnerability Research 

At Wordfence, we run a bug bounty program that pays out mid-six figures per year to researchers in bug bounties

Welcome to Agents Week 
  

Welcome to Agents Week 

Cloudflare’s mission has always been to help build a better Internet. Sometimes that means building for the Internet as it

500 Tbps of capacity: 16 years of scaling our global network 
  

500 Tbps of capacity: 16 years of scaling our global network 

Cloudflare’s global network has officially crossed 500 Tbps of external capacity, enough to route more than 20% of the web

How to protect your privacy while using smart sex toys | Kaspersky official blog 
  

How to protect your privacy while using smart sex toys | Kaspersky official blog 

We explore the risks of smart sex toys — from data breaches and tracking to vulnerabilities — and offer practical

JanelaRAT: a financial threat targeting users in Latin America 
  

JanelaRAT: a financial threat targeting users in Latin America 

Kaspersky GReAT experts describe the latest JanelaRAT campaign detailing infection chain and malware functionality updates.SecurelistRead More

Transforming industries with physical AI 
  

Transforming industries with physical AI 

Cisco’s Vikas Butaney on the 2026 State of Industrial AI Report — and what it takes to be an AI

Dynamic, identity-aware, and secure Sandbox auth 
  

Dynamic, identity-aware, and secure Sandbox auth 

Outbound Workers for Sandboxes provide a programmable, zero-trust egress proxy for AI agents. This allows developers to inject credentials and

  

The Internet’s Trust Architecture 

The Internet’s core, rooted in open standards and unique identifiers, has always depended on trust. That trust is part of

Agents have their own computers with Sandboxes GA 
  

Agents have their own computers with Sandboxes GA 

Cloudflare Sandboxes give AI agents a persistent, isolated environment: a real computer with a shell, a filesystem, and background processes

  

13th April – Threat Intelligence Report 

For the latest discoveries in cyber research for the week of 13th April, please download our Threat Intelligence Bulletin. TOP

Durable Objects in Dynamic Workers: Give each AI-generated app its own database 
  

Durable Objects in Dynamic Workers: Give each AI-generated app its own database 

We’re introducing Durable Object Facets, allowing Dynamic Workers to instantiate Durable Objects with their own isolated SQLite databases. This enables

  

Mailbox rules in O365—a post-exploitation tactic in cloud ATO 

Key Takeaways  Mailbox rules are a high-risk post-exploitation tactic. Attackers abuse native mailbox rules for exfiltration, persistence, and communication manipulation. Combined with third-party services

Building a CLI for all of Cloudflare 
  

Building a CLI for all of Cloudflare 

We’re introducing cf, a new unified CLI designed for consistency across the Cloudflare platform, alongside Local Explorer for debugging local

  

The Nansh0u Campaign – Hackers Arsenal Grows Stronger 

In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three

  

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers 

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.BlogRead

  

The Oracle of Delphi Will Steal Your Credentials 

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The

  

Keep Your Tech Flame Alive: Trailblazer Rachel Bayley 

In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their

  

Threats Making WAVs – Incident Response to a Cryptomining Attack 

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.

     

Így látja a Cisco az OT biztonságot

A laborban jól működő OT-biztonsági POC-k gyakran elvéreznek éles, vállalati szintű kiterjesztéskor. A hagyományos, SPAN-alapú láthatósági megoldások skálázáskor elszálló CAPEX/OPEX-et

  

Threats Making WAVs – Incident Response to a Cryptomining Attack 

Guardicore security researchers describe and uncover a full analysis of a cryptomining attack, which hid a cryptominer inside WAV files.

  

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers 

Guardicore Labs uncovers a Ransomware detection campaign targeting MySQL servers. Attackers use Double Extortion and publish data to pressure victims.BlogRead

  

The Oracle of Delphi Will Steal Your Credentials 

Our deception technology is able to reroute attackers into honeypots, where they believe that they found their real target. The

  

Strategy for the Office Anywhere 

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we

  

Strategy for the Office Anywhere 

Organizations must deploy a remote working strategy that suits the office anywhere model CIOs need to demonstrate leadership as we

  

The Nansh0u Campaign ? Hackers Arsenal Grows Stronger 

In the beginning of April, three attacks detected in the Guardicore Global Sensor Network (GGSN) caught our attention. All three

  

Keep Your Tech Flame Alive: Trailblazer Rachel Bayley 

In this Akamai FLAME Trailblazer blog post, Rachel Bayley encourages women to step into the unknown and to be their

   

A Stargazer Goblin GitHub fiókokat gyűjt rosszindulatú programok terjesztésére

A CheckPoint kutatóinak jelentése egy kifinomult kártevő terjesztési rendszert ír le, amelyet a “Stargazer Goblin” nevű fenyegető csoport követett el.

   

A Proton elindította a Google Dokumentumok adatvédelmi fókuszú alternatíváját

A Proton elindította a Proton Docs-t, a magánélet-központú munkaeszköz-csomagjának legújabb alkalmazását, amely a Google Docs-hoz hasonló, a Google-hoz nem kötődő

   

Kaspersky NIS2 Solution Map

A NIS 2 irányelv az Európai Unió (EU) szabályrendszere, amelynek célja a kulcsfontosságú iparágak kiberbiztonságának fokozása. Az Irányelv 2023. január

   

Anonymous Sudan – TIP

A dokumentum szerint azonban míg az Anonymous kollektíva egy sokszínű és kiterjedt csoport, amely sok különböző eszméket karolnak fel, a megfigyelések arra utalnak, hogy a magát “Anonymous Sudan”-nak nevező csoportnak semmi köze nincs a nagyobb Anonymous kollektívához, vagy az eredeti Anonymous Sudan mögött álló felhasználókhoz, illetve a #OpSudan Anonymous akciókhoz.

cloudflare
   

A Cloudflare rekordot jelentő 71 millió kérés/másodperc DDoS-támadást hárított el

A Cloudflare blogbejegyzése egy rekordot döntő DDoS-támadás sikeres elhárításáról számol be, és számos fontos tanulsággal szolgál. A támadás rávilágított a DDoS-támadások növekvő méretére és gyakoriságára, valamint arra, hogy többrétegű védelmi stratégiákra van szükség a hatékony elhárításukhoz. A támadásra adott sikeres válaszlépés a biztonsági szolgáltatók és szervezetek közötti együttműködés fontosságát is demonstrálta, valamint a mesterséges intelligencia és a gépi tanulás használatát a támadások valós idejű azonosítása és enyhítése érdekében. A jelentés hangsúlyozza a DDoS-támadások folyamatos és változó fenyegetését, valamint azt, hogy a szervezeteknek ébernek és felkészültnek kell maradniuk az ilyen támadásokra.

mandiant
   

A támadó fejével gondolkozni…

A Mandiant Security Perspectives Report kiemeli a kibertámadások egyre növekvő fenyegetettségét, különös tekintettel a zsarolóvírus-támadások egyre kifinomultabb és pusztítóbb jellegére. A jelentés azt is megjegyzi, hogy a távmunka új sebezhetőségeket és kihívásokat teremtett a szervezetek számára a távoli hozzáférés biztosítása terén, és hogy az ellátási láncot érő támadások egyre nagyobb aggodalomra adnak okot. E kihívások kezelése érdekében a szervezeteknek a proaktív fenyegetésvadászatra és -felderítésre kell összpontosítaniuk, hogy gyorsabban azonosíthassák a támadásokat és reagálhassanak rájuk. A jelentés végső soron arra emlékeztet, hogy a kibertámadások fenyegetése valós és folyamatos, és hogy a szervezeteknek továbbra is ébernek és proaktívnak kell maradniuk az ellenük való védekezésben.

   

Hogyan védhetjük magunkat MFA adathalász támadással szemben

Az elmúl hetekben több kutató is felhívta a figyelemet kiterjedt adathalász támadásokra, melyek a MFA (Multifactor Authentication) többényezős hitelesítéssel védett

  

Dongó rosszindulatú kód

Bumblebee kód emlemzését nemrég publikálta a Paloaltonetwork. Projector Libra az egyik bűnöző csoport amely Bumblebee-t terjeszti. Ezt teszi oly módon,

   

Aktívan kihasználják az Exchange sérülékenységet

Az elemzőket és a szakértőket is meglepte, milyen mértékű lehet a március elején bejelentett Microsoft Exchange szervereket érintő sérülékenység kihasználása.

   

Tisztelt Ügyfelünk, cseréljen jelszót!

A Ubiquiti Networks termékei közt főként  vezeték nélküli eszközök találhatóak kifejezetten kis-és közepes méretű vállalkozások számára kifejlesztve. A cég most

   

A DJI a HUAWEI sorsára jut

A DJI – az egyik legnépszerűbb drónokat gyártó kínai cég – felkerült az USA Kereskedelmi Minisztériumának üzleti titok lopása alanyainak listájára, ahol a Huawei és a ZTE is szerepel, sok más kínai gyártóval együtt. A minisztérium az utolsó frissítés során 77 új “entitást” vett fel a listára.

   

SolarWinds: az ellátási lánc támadása

A SolarWinds elleni támadás nagyságrendileg 18 000 vállalatot érint. Márciusban a frissítésekbe rejtett backdoorral sikerült elérnie a támadóknak, hogy olyan szervezeteket is célpontként tudjon kezelni, mint a FireEye, vagy az USA Kereskedelmi és Pénzügyminisztériuma, vagy a Belbiztonsági Minisztérium egyes rendszerei és az érintett szervezetek száma egyre nő és nem mindegyik publikus.

    

A suszter tüzes szeme

Igaz a hír, és lassan fél napja a világ IT szakértői elemzik, hogy az amerikai székhelyű FireEye kiberbiztonsági céget kibertámadás érte. A támadás tényét maga a cég jelentette be blogján, és a sok érdekes tény mellett kiemelték, hogy következtetéseik és az elemzések jelenlegi eredményei szerint államilag szponzorált hackerek hatoltak be az informatikai rendszerükbe. Az első sokkon túl azonban álljunk meg egy percre: