雅虎香港 搜尋

搜尋結果

  1. 2 天前 · This PSA raises awareness of the efforts posed by foreign threat actors to spread disinformation in the lead up to, and likely in the days following, the 2024 U.S. general election. Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in various critical infrastructure sectors.

  2. 2024年8月28日 · The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that, as of August 2024, a group of Iran-based cyber actors continues to exploit U.S. and foreign organizations.

  3. 2024年8月26日 · August 26, 2024. CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-7971. (link is external) Google Chromium V8 Type Confusion Vulnerability. These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the ...

  4. 2021年2月1日 · A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). Digital signatures create a virtual fingerprint that is unique to a person or entity and are used to identify users and ...

  5. 2023年11月14日 · WASHINGTON – Today the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) released its first Roadmap for Artificial Intelligence (AI), adding to the significant DHS and broader whole-of-government effort to ensure the secure development and implementation of artificial intelligence capabilities.

  6. www.cisa.gov › news-events › bulletinsBulletins - CISA

    2024年8月5日 · Vulnerability Summary for the Week of July 29, 2024. Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.

  7. 3 天前 · Vendor/Project. Known Exploited Vulnerabilities Catalog. For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

  8. 2020年10月5日 · This updated advisory is a follow-up to the original advisory titled ICSA-19-211-01 Wind River VxWorks that was published July 30, 2019, on the ICS webpage on us-cert.gov. 3. RISK EVALUATION. Successful exploitation of these vulnerabilities could allow remote code execution. 4.

  9. Contact Us. For more questions on this topic or CISA in general, please contact Central@cisa.gov. Organizations can also report anomalous cyber activity and/or cyber incidents 24/7 to SayCISA@cisa.dhs.govor by calling 1-844-Say-CISA (1-844-729-2472). Return to top.

  10. 2024年10月8日 · The U.S. Department of Homeland Security released the Cyber Safety Review Board’s (CSRB) findings and recommendations following its independent review of the Summer 2023 Microsoft Exchange Online intrusion. The review detailed operational and strategic decisions that led to the intrusion and recommended specific practices for industry and ...

  1. 其他人也搜尋了