cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qiling», bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

Информация опасносте

Чаще про c̶y̶b̶e̶r̶s̶e̶x̶ cybersec Нет, «опасносте» не опечатка @alexmaknet Размещение рекламы остановлено в связи с войной России против Украины

Ko'proq ko'rsatish
Reklama postlari
20 748
Obunachilar
-224 soatlar
-27 kunlar
+2030 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

Не забудьте проапдейтить Хром https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html https://nvd.nist.gov/vuln/detail/cve-2024-0519 Google is aware that an exploit for CVE-2024-4671 exists in the wild.
Hammasini ko'rsatish...
Stable Channel Update for Desktop

The Stable channel has been updated to 124.0.6367.201/.202 for Mac and  Windows  and  124.0.6367.201  for Linux which will roll out over the...

🥰 16😁 5👀 5🎉 1
Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers. The computer maker began emailing data breach notifications to customers yesterday, stating that a Dell portal containing customer information related to purchases was breached. "We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell," reads a Dell data breach notification shared with BleepingComputer. https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/
Hammasini ko'rsatish...
Dell warns of data breach, 49 million customers allegedly affected

Dell is warning customers of a data breach after a threat actor claimed to have stolen information for approximately 49 million customers.

👍 13🔥 7 4🤡 2🌚 1
00:07
Video unavailableShow in Telegram
Security! security! security! security! https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/ безопасность теперь самый главный приоритет у Microsoft.
Hammasini ko'rsatish...
🤣 76👍 11😁 9🤡 6🎃 1
Группа экспертов по информационной безопасности из ассоциации Netzbegrünung обнаружила уязвимости в работе сервиса видеоконференций Cisco Webex, который использовали в Вооруженных силах Германии. Как показало исследование газеты Zeit, данные о тысячах онлайн-совещаний в бундесвере, проводившихся через Webex, многие месяцы находились в открытом доступе в интернете. https://netzbegruenung.de/blog/netzbegruenung-deckt-it-sicherheits-und-datenschutz-schwachstellen-von-ciscos-videokonferenzdienst-webex-auf/ https://www.zeit.de/digital/datenschutz/2024-05/bundeswehr-webex-sicherheitsluecke-it-sicherheit/komplettansicht
Hammasini ko'rsatish...
Bundeswehr: Jeder konnte sie finden

Tausende Links zu Videomeetings der Bundeswehr standen offenbar monatelang offen im Netz. Sie waren mit wenig Aufwand auffindbar – inklusive interner Informationen.

😁 79😱 26🤡 26😢 6👍 3🔥 3🫡 3🎉 1
Photo unavailableShow in Telegram
Бля
Hammasini ko'rsatish...
🫡 109😱 12🔥 9🤡 6😢 4🤬 3👍 2🤣 2🤷‍♀ 1👏 1🍾 1
https://finance.yahoo.com/news/dropbox-says-hackers-breached-digital-211551057.html "Мы обнаружили, что злоумышленник получил доступ к данным всех пользователей Dropbox Sign, таким как электронная почта и имена пользователей, а также к общим настройкам аккаунта. Для отдельных пользователей он также получил доступ к номерам телефонов, хэшированным паролям и некоторым данным аутентификации, таким как ключи API, токены OAuth и многофакторной аутентификации".
Hammasini ko'rsatish...
Dropbox Says Hackers Breached Digital-Signature Product

(Bloomberg) -- Dropbox Inc. said its digital-signature product, Dropbox Sign, was breached by hackers, who accessed user information including emails, user names and phone numbers.Most Read from BloombergUS and Saudis Near Defense Pact Meant to Reshape Middle EastSaudi Arabia Steps Up Arrests Of Those Attacking Israel OnlineBiden Calls Ally Japan ‘Xenophobic’ Along With China, RussiaHuawei Secretly Backs US Research, Awarding Millions in PrizesTesla Axes Supercharger Team in Blow to Broader EV M

👍 34😱 29🔥 7🤡 7🎉 3🙈 2😁 1🤬 1
Google перенесла отказ от сторонних кукис в Хроме на начало 2025 года https://privacysandbox.com/intl/en_us/news/update-on-the-plan-for-phase-out-of-third-party-cookies-on-chrome/
Hammasini ko'rsatish...
Update on the plan for phase-out of third-party cookies on Chrome

We are providing an update on the plan for third-party cookie deprecation on Chrome.

😁 41🤡 26👍 10🤔 3🍾 3🔥 2🤪 2🌚 1
Активно эксплуатируемый zero-day для Cisco к нам пришел https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
Hammasini ko'rsatish...
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices

ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns.

😁 13💩 5🎉 2🖕 2👍 1🤡 1
Похоже, вот это - причина такого уведомления пользователей https://blogs.blackberry.com/en/2024/04/lightspy-returns-renewed-espionage-campaign-targets-southern-asia-possibly-india
Hammasini ko'rsatish...
LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India

After months of inactivity, the advanced mobile spyware LightSpy has resurfaced with expanded capabilities, targeting individuals in Southern Asia.

🤔 6😱 3👍 2
патчи вчера поздно ночью выложили https://unit42.paloaltonetworks.com/cve-2024-3400/
Hammasini ko'rsatish...
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400

We detail Operation MidnightEclipse, a campaign exploiting command injection vulnerability CVE-2024-3400, and include protections and mitigations.

🔥 17🥰 1