{"id":27882,"date":"2023-08-15T12:56:57","date_gmt":"2023-08-15T10:56:57","guid":{"rendered":"https:\/\/kinit.sk\/security-news-july-2023\/"},"modified":"2023-08-15T13:07:23","modified_gmt":"2023-08-15T11:07:23","slug":"security-news-july-2023","status":"publish","type":"post","link":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/","title":{"rendered":"Security News &#8211; J\u00fal 2023"},"content":{"rendered":"<div id=\"\" class=\"element core-paragraph\">\n<p>Pre\u010d\u00edtajte si preh\u013ead noviniek z oblasti kybernetickej bezpe\u010dnosti za j\u00fal 2023. Ka\u017ed\u00fd mesiac v\u00e1m budeme prin\u00e1\u0161a\u0165 bezpe\u010dnostn\u00e9 pr\u00edpady a zauj\u00edmavosti, ktor\u00e9 v\u00e1m pom\u00f4\u017eu zosta\u0165 v bezpe\u010d\u00ed.&nbsp;<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h3 class=\"wp-block-heading\">Politika<\/h3>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Pro\u010d\u00ednska hackersk\u00e1 skupina Storm-0558<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-chinese-hackers-breached-us-govt-exchange-email-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\"> hackla e-mailov\u00e9 kont\u00e1 viac ako dvoch desiatok organiz\u00e1ci\u00ed<\/a>, vr\u00e1tane americk\u00fdch a eur\u00f3pskych vl\u00e1dnych agent\u00far. \u00dato\u010dn\u00edci pou\u017eili autentifika\u010dn\u00e9 tokeny, ktor\u00e9 sfal\u0161ovali pomocou ukradnut\u00e9ho k\u013e\u00fa\u010da Microsoft, na podpisovanie spotrebite\u013esk\u00fdch \u00fa\u010dtov.\u00a0<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Prorusk\u00e1 skupina RonCom akt\u00edvne <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-unpatched-office-zero-day-exploited-in-nato-summit-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">zneu\u017e\u00edvala zranite\u013enos\u0165<\/a> vo Windows a MS Office. Zneu\u017e\u00edvali ju aj po\u010das samitu NATO v Litve, kde mohli \u00fato\u010dn\u00edci bez autentifik\u00e1cie \u00faplne naru\u0161i\u0165 princ\u00edpy d\u00f4vernosti, dostupnosti a integrity, i ke\u010f komplikovan\u00fdm sp\u00f4sobom.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/github-warns-of-lazarus-hackers-targeting-devs-with-malicious-projects\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub varuje pre kampa\u0148ou severok\u00f3rejskej skupiny Lazarus<\/a>. Kampa\u0148 cieli na program\u00e1torov blockchain, cryptocurrency, online st\u00e1vkovania a kybernetickej bezpe\u010dnosti. Ich cie\u013eom je infikova\u0165 ich malware-om, na \u010do vyu\u017e\u00edvaj\u00fa soci\u00e1lne in\u017einierstvo a pozv\u00e1nku na pr\u00e1cu na GitHub repozit\u00e1ri so \u0161kodliv\u00fdmi NPM z\u00e1vislos\u0165ami.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ukraine-takes-down-massive-bot-farm-seizes-150-000-sim-cards\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ukrajina rozlo\u017eila \u010fal\u0161iu ve\u013ek\u00fa farmu botov<\/a>, ktor\u00e1 sa dotkla viac ako 100 \u013eud\u00ed v takmer dvadsiatich lokalit\u00e1ch. Tie\u017e zadr\u017eali viac ako 150 000 SIM kariet. Boti boli pou\u017e\u00edvan\u00ed na \u0161\u00edrenie ruskej propagandy a na ospravedl\u0148ovanie ruskej inv\u00e1zie na Ukrajinu.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/cybernews.com\/news\/russian-gang-leaks-nato-summit-docs-vilnius\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rusk\u00e1 skupina From Russia with Love tvrd\u00ed<\/a>, \u017ee ukradla inform\u00e1cie t\u00fdkaj\u00face sa bezpe\u010dnosti samitu NATO vo Vilniuse. Ve\u013ek\u00e1 \u010das\u0165 d\u00e1t v\u0161ak poch\u00e1dzala z verejne dostupn\u00fdch inform\u00e1ci\u00ed, ktor\u00e9 boli zverejnen\u00e9 a\u017e po samite. Litovsk\u00e9 centrum kybernetickej obrany tvrd\u00ed, \u017ee sa \u017eiadny \u00fatok na kritick\u00fa infra\u0161trukt\u00faru nekonal.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Biely dom sa sna\u017e\u00ed <a href=\"https:\/\/www.scmagazine.com\/news\/biden-fcc-u-s-cyber-trust-mark-labeling\" target=\"_blank\" rel=\"noreferrer noopener\">zv\u00fd\u0161i\u0165 bezpe\u010dnos\u0165 IoT zariaden\u00ed<\/a> tak, \u017ee zaviedol dobrovo\u013en\u00fa zn\u00e1mku \u201cU.S. Cyber Trust Mark\u201d. Na to, aby zariadenia z\u00edskali t\u00fato certifik\u00e1ciu, musia sp\u013a\u0148a\u0165 krit\u00e9ria a \u0161tandardy definovan\u00e9 organiz\u00e1ciou NIST.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h3 class=\"wp-block-heading\">Vy\u0161etrovanie a v\u00fdskum<\/h3>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>B\u00fdval\u00fd zamestnanec Kalifornskej spolo\u010dnosti na \u00fapravu vody bol ob\u017ealovan\u00fd <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/former-employee-charged-for-attacking-water-treatment-plant\/\" target=\"_blank\" rel=\"noreferrer noopener\">za \u00famyseln\u00fd pokus znefunk\u010dni\u0165<\/a> bezpe\u010dnostn\u00e9 a ochrann\u00e9 syst\u00e9my spolo\u010dnosti. Po svojom odchode zo spolo\u010dnosti sa ju pok\u00fasil z\u00e1merne po\u0161kodi\u0165 pomocou softv\u00e9ru na vzdialen\u00fd pr\u00edstup, ktor\u00fd nain\u0161taloval na svoj pracovn\u00fd po\u010d\u00edta\u010d.\u00a0<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-130-000-solar-energy-monitoring-systems-exposed-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">V\u00fdskumn\u00edci varuj\u00fa<\/a>, \u017ee desiatky tis\u00edc monitorovac\u00edch a diagnostick\u00fdch fotovolatick\u00fdch syst\u00e9mov (od Solar-Log, Danfoss Solar Web Server,&#8230;) je vo\u013ene dostupn\u00fdch na webe. M\u00f4\u017eu sa tak sta\u0165 ter\u010dom hackerov, ke\u010f\u017ee neautorizovan\u00ed pou\u017e\u00edvatelia vedia pristupova\u0165 k \u00fadajom a pri v\u00fdskyte zranite\u013enost\u00ed m\u00f4\u017eu aj akt\u00edvne zneu\u017ei\u0165 syst\u00e9my.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>\u0160v\u00e9dsky \u00farad pre ochranu \u00fadajov udelil za pou\u017e\u00edvanie Google Analytics dve pokuty v sume viac ako jeden mili\u00f3n eur. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-analytics-data-transfer-to-us-brings-1-million-fine-to-swedish-firms\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pou\u017e\u00edvan\u00edm Google Analytics pokutovan\u00e9 spolo\u010dnosti poru\u0161ili GDPR<\/a>, preto\u017ee do\u0161lo k transferu osobn\u00fdch \u00fadajov do tret\u00edch kraj\u00edn, ktor\u00e9 nemaj\u00fa dostato\u010dn\u00fa ochranu osobn\u00fdch \u00fadajov.\u00a0<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>N\u00f3rsky \u00farad pre ochranu \u00fadajov <a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/facebook-behavioral-ads-banned-by-norwegian-privacy-watchdog\/\" target=\"_blank\" rel=\"noreferrer noopener\">zak\u00e1zal na soci\u00e1lnych sie\u0165ach Facebook a Instagram<\/a> <a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/facebook-behavioral-ads-banned-by-norwegian-privacy-watchdog\/\">behavior\u00e1lnu reklamu<\/a>. Tak\u00e9to reklamy s\u00fa zak\u00e1zan\u00e9, pokia\u013e pou\u017e\u00edvatelia neudelia explicitn\u00fd s\u00fahlas so spracovan\u00edm svojich osobn\u00fdch \u00fadajov na tento \u00fa\u010del.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Viac ako <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-15k-citrix-servers-vulnerable-to-cve-2023-3519-rce-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">15 000 Citrix zariaden\u00ed je zranite\u013en\u00fdch<\/a> vo\u010di vzdialen\u00e9mu spusteniu k\u00f3du. Odhalen\u00e9 boli aj \u010fal\u0161ie zranite\u013enosti. Ku v\u0161etk\u00fdm boli vydan\u00e9 aktualiz\u00e1cie alebo n\u00e1vody ako minimalizova\u0165 ich dopad.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.hackread.com\/crit-ix-honeywell-experion-dcs-flaws-risk\/\" target=\"_blank\" rel=\"noreferrer noopener\">V\u00fdskumn\u00edci preverili bezpe\u010dnos\u0165 platformy Honeywell Experion DCS<\/a>. Na\u0161li dev\u00e4\u0165 zranite\u013enost\u00ed, z toho sedem bolo kritick\u00fdch. Umo\u017e\u0148ovali vzdialen\u00e9 vykon\u00e1vanie k\u00f3du aj bez detekcie na strane oper\u00e1tora. Platforma sa pou\u017e\u00edva v kritickej infra\u0161trukt\u00fare, najm\u00e4 v ropnom priemysle. Pred zverejnen\u00edm inform\u00e1ci\u00ed o zranite\u013enostiach spolo\u010dnos\u0165 vydala aktualiz\u00e1cie.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Nemeck\u00ed v\u00fdskumn\u00edci na\u0161li <a href=\"https:\/\/publications.cispa.saarland\/3934\/1\/SatSec-Oakland22.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">viacero zranite\u013enost\u00ed vo firmware ur\u010denom pre satelity<\/a>. Rovnako zistili, \u017ee v tejto dom\u00e9ne sa pou\u017e\u00edva extr\u00e9mne m\u00e1lo bezpe\u010dnostn\u00fdch prvkov.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>V\u00fdskumn\u00edci <a href=\"https:\/\/www.theregister.com\/2023\/07\/24\/tetra_radio_security_flaws\/\" target=\"_blank\" rel=\"noreferrer noopener\">odhalili zranite\u013enosti v Terrestrial Trunked Radio<\/a> (TETRA), ktor\u00e9 sa pou\u017e\u00edva najm\u00e4 v Eur\u00f3pe, ale aj in\u00fdch krajin\u00e1ch. Zranite\u013enosti umo\u017e\u0148uj\u00fa de\u0161ifrova\u0165 komunik\u00e1ciu v re\u00e1lnom \u010dase, injektova\u0165 spr\u00e1vy a deanonymizova\u0165 pou\u017e\u00edvate\u013eov. Zranite\u013enos\u0165 TEA1 na \u0161ifrovac\u00ed algoritmus p\u00f4sob\u00ed ako zamerne vlo\u017een\u00fd backdoor.\u00a0<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h3 class=\"wp-block-heading\">\u00datoky a \u00faniky inform\u00e1ci\u00ed<\/h3>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/usb-drive-malware-attacks-spiking-again-in-first-half-of-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u0160\u00edrenie malware-u prostredn\u00edctvom USB k\u013e\u00fa\u010dov<\/a> st\u00faplo trojn\u00e1sobne. Za malware-mi Sogu a Snowydrive stoja dve pro\u010d\u00ednske skupiny, ktor\u00e9 s\u00fa v\u00fdrazne zameran\u00e9 na \u0161pion\u00e1\u017enu aktivitu a exfiltr\u00e1ciu inform\u00e1ci\u00ed. V\u00fdhodou \u0161\u00edrenia cez USB k\u013e\u00fa\u010de je ob\u00eddenie sie\u0165ov\u00fdch bezpe\u010dnostn\u00fdch mechanizmov a \u00favodn\u00e1 maskovanos\u0165.\u00a0<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Deutsche Bank potvrdila, \u017ee <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/deutsche-bank-confirms-provider-breach-exposed-customer-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">jeden z ich poskytovate\u013eov slu\u017eieb sa stal obe\u0165ou \u00faniku d\u00e1t<\/a>. Stalo sa tak pravdepodobne v r\u00e1mci kr\u00e1de\u017ei \u00fadajov MOVEit Transfer. Syst\u00e9my banky v\u0161ak neboli napadnut\u00e9 ani nijako ovplyvnen\u00e9.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Najv\u00e4\u010d\u0161\u00ed j<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/japans-largest-port-stops-operations-after-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">aponsk\u00fd pr\u00edstav Nagoya musel preru\u0161i\u0165 svoju \u010dinnos\u0165<\/a> pre ransomware \u00fatok. Ke\u010f\u017ee cez pr\u00edstav prech\u00e1dza 10% celkov\u00e9ho japonsk\u00e9ho obchodu, ka\u017ed\u00e9 preru\u0161enie jeho \u010dinnosti vedie k v\u00fdznamn\u00fdm hospod\u00e1rskym \u0161kod\u00e1m. Za \u00fatokom <a href=\"https:\/\/www.sangfor.com\/blog\/cybersecurity\/nagoya-port-cyber-attack-by-lockbit-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">stoj\u00ed<\/a> ransomware gang LockBit.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-tech-support-scams-now-use-shipping-companies-to-collect-cash\/\" target=\"_blank\" rel=\"noreferrer noopener\">Podvodn\u00edci cielia na star\u0161\u00edch \u013eud\u00ed<\/a>. Sna\u017eia sa ich zmanipulova\u0165 k stiahnutiu softv\u00e9ru, ktor\u00fd umo\u017en\u00ed vzdialen\u00fd pr\u00edstup k ich po\u010d\u00edta\u010du. Z\u00e1rove\u0148 ich nav\u00e1dzaj\u00fa k tomu, aby im poslali hotovos\u0165 cez \u0161tandardn\u00e9 z\u00e1sielkov\u00e9 spolo\u010dnosti t\u00fdm, \u017ee ich upozor\u0148uj\u00fa na fikt\u00edvnu nebezpe\u010dn\u00fa \u010dinnos\u0165 na ich \u00fa\u010dte.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/cybernews.com\/privacy\/meta-threads-launch-europe-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threads od spolo\u010dnosti Meta zatia\u013e nemohol by\u0165 spusten\u00fd v E\u00da<\/a> z d\u00f4vodu pr\u00edsnej\u0161\u00edch z\u00e1konov pre ochranu s\u00fakromia. Probl\u00e9mom je snaha Mety vyu\u017ei\u0165 na novej platforme citliv\u00e9 \u00fadaje pou\u017e\u00edvate\u013eov z Instagramu. \u00cdrsky \u00farad pre ochranu osobn\u00fdch \u00fadajov u\u017e raz zabr\u00e1nil spolo\u010dnosti Meta vyu\u017e\u00edva\u0165 \u00fadaje z Facebooku a Instagramu v reklamn\u00fdch kampaniach na WhatsApp-e.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Firma ARx Patient Solutions priznala, \u017ee pri kybernetickom \u00fatoku v roku 2022 <a href=\"https:\/\/cybernews.com\/privacy\/us-healthcare-breach-child-patient-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">do\u0161lo k \u00faniku osobn\u00fdch \u00fadajov<\/a> viac ako 40 000 \u013eud\u00ed, v\u00e4\u010d\u0161inou det\u00ed. \u00datok zapr\u00ed\u010dinila kompromit\u00e1cia zamestnaneck\u00e9ho konta.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.scmagazine.com\/resource\/24-hour-recovery-how-an-american-business-beat-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">Firma G&amp;J Pepsi sa stala obe\u0165ou ransomware \u00fatoku<\/a>. Za \u00fatokom st\u00e1lo kompromitovan\u00e9 konto zamestnanca a neskoro nain\u0161talovan\u00e1 aktualiz\u00e1cia Exchange servera. V\u010faka dobr\u00e9mu nastaveniu infra\u0161trukt\u00fary sa im v\u0161ak podarilo odstr\u00e1ni\u0165 n\u00e1sledky \u00fatoku v priebehu 7 hod\u00edn od jeho zistenia.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.scmagazine.com\/news\/mass-attack-on-wordpress-sites-targets-bug-in-woocommerce-plugin\" target=\"_blank\" rel=\"noreferrer noopener\">Rozsiahly \u00fatok<\/a> proti st\u00e1tis\u00edcom WordPress str\u00e1nkam cielil na zranite\u013enos\u0165 v module WooCommerce Payments. V\u010faka zranite\u013enosti bolo mo\u017en\u00e9 ovl\u00e1dnu\u0165 cel\u00fa str\u00e1nku. Aktualiz\u00e1cia proti tejto zranite\u013enosti je k dispoz\u00edci\u00ed od marca.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.scmagazine.com\/news\/dating-app-spills-340gb-of-steamy-data-and-260000-user-profiles\" target=\"_blank\" rel=\"noreferrer noopener\">Aplik\u00e1cia elektronickej zoznamky<\/a> nechala nezabezpe\u010den\u00e9 \u00fadaje na jednom z Amazon serverov, \u010do viedlo k spr\u00edstupneniu 340 GB \u00fadajov, vy\u0161e 260 000 pou\u017e\u00edvate\u013esk\u00fdch \u00fa\u010dtov, vr\u00e1tane priv\u00e1tnych spr\u00e1v, z\u00e1znamov z chatov, audio s\u00faborov a obr\u00e1zkov, ktor\u00e9 boli s\u00fakromne zdie\u013ean\u00e9 medzi pou\u017e\u00edvate\u013emi. Pou\u017e\u00edvatelia by mali by pri vyu\u017e\u00edvan\u00ed tak\u00e9hoto typu aplik\u00e1ci\u00ed obozretn\u00ed.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>V d\u00f4sledku \u013eudskej chyby do\u0161lo <a href=\"https:\/\/www.hackread.com\/virustotal-sensitive-data-leak-apology\/\" target=\"_blank\" rel=\"noreferrer noopener\">k \u00faniku inform\u00e1ci\u00ed o 5 600 klientoch VirusTotal<\/a>. Stalo sa tak kv\u00f4li ne\u00famyseln\u00e9mu nahratiu CSV s\u00faboru so z\u00e1kladn\u00fdmi inform\u00e1ciami o klientoch. Inform\u00e1cie boli dostupn\u00e9 len pre majite\u013eov pr\u00e9miovej platformy.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.hackread.com\/fake-facebook-chatgpt-ai-pages-infostealers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Napodobeniny ChatGPT, Google BARD, \u010di Jasper<\/a> na Facebooku pom\u00e1haj\u00fa \u0161\u00edri\u0165 malware zameran\u00fd na kr\u00e1de\u017e inform\u00e1ci\u00ed. Niektor\u00e9 z napodoben\u00edn maj\u00fa mili\u00f3ny sledovate\u013eov, \u010do poukazuje na to, \u017ee s\u00fa ve\u013emi roz\u0161\u00edren\u00e9.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.govinfosecurity.com\/florida-hospital-says-data-theft-attack-affects-12-million-a-22616\" target=\"_blank\" rel=\"noreferrer noopener\">Po ransomware \u00fatoku<\/a> upozornila nemocnica Tampa General Hospital 1,2 mili\u00f3na pacientov, \u017ee ich inform\u00e1cie ukradli hackeri. V\u010faka pou\u017eitiu monitorovac\u00edch n\u00e1strojov a pomoci firmy so zameran\u00edm na forenzn\u00fa anal\u00fdzu nedo\u0161lo k za\u0161ifrovaniu \u00fadajov, \u010do by mohlo vies\u0165 k ochromeniu nemocnice.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-heading\">\n<h3 class=\"wp-block-heading\">Ostatn\u00e9<\/h3>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Na konci roka <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-23h2-coming-this-fall-as-a-small-enablement-package\/\" target=\"_blank\" rel=\"noreferrer noopener\">bude vydan\u00e1 nov\u00e1 verzia<\/a> Windows 11 &#8211; 23H2, ktor\u00e1 prinesie aj niektor\u00e9 nov\u00e9 funkcionality: Windows Copilot, nat\u00edvna podpora ovl\u00e1dania RGB, modernizovan\u00fd File Explorer, nat\u00edvna podpora 7z, gz, RAR, tar a in\u00e9.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/github-goes-passwordless-announces-passkeys-beta-preview\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub ozn\u00e1mil uvedenie bezheslovej autentifik\u00e1cie<\/a> vo verejnej beta verzi\u00ed. Pou\u017e\u00edva\u0165 na to bude pr\u00edstupov\u00e9 k\u013e\u00fa\u010de, ktor\u00e9 s\u00fa viazan\u00e9 ku konkr\u00e9tnym zariadeniam (po\u010d\u00edta\u010dom, smartf\u00f3nom), \u010do minimalizuje \u0161ancu na ich zneu\u017eitie a chr\u00e1ni pou\u017e\u00edvate\u013eov pred kr\u00e1de\u017eou identity. K dispoz\u00edci\u00ed bude tie\u017e biometria.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Microsoft testuje v syst\u00e9me Windows 11 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-enhances-windows-11-phishing-protection-with-new-features\/\" target=\"_blank\" rel=\"noreferrer noopener\">nov\u00fa pokro\u010dil\u00fa ochranu proti phishingu<\/a>. T\u00e1 je navrhnut\u00e1 na ochranu pred \u00fanikom pr\u00edstupov\u00fdch \u00fadajov do Windows a Active Directory. Ukradnut\u00e9 prihlasovacie \u00fadaje s\u00fa naj\u010dastej\u0161\u00edm d\u00f4vodom kompromit\u00e1cie firemn\u00fdch syst\u00e9mov.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Uskuto\u010dnil sa <a href=\"https:\/\/www.scmagazine.com\/news\/ai-unlikely-to-overtake-humans-in-cybersecurity-hackers-say-in-new-survey\" target=\"_blank\" rel=\"noreferrer noopener\">prieskum medzi 1 000 hackermi<\/a> na t\u00e9mu Umel\u00e1 inteligencia a kybernetick\u00e1 bezpe\u010dnos\u0165. A\u017e 85% potvrdilo, \u017ee pou\u017e\u00edvaj\u00fa AI pri hackovan\u00ed, pri\u010dom 98% z nich pou\u017eiloChatGPT. Medzi \u010dast\u00e9 aktivity nasadenia Umelej inteligencie patr\u00ed pou\u017eitie pri automatizovan\u00ed \u00faloh, anal\u00fdze d\u00e1t a identifik\u00e1cii zranite\u013enost\u00ed.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>V\u00fdrobcom priemyselnej infra\u0161trukt\u00fary boli <a href=\"https:\/\/www.scmagazine.com\/news\/rockwell-automation-exploit-critical-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">ozn\u00e1men\u00e9 kritick\u00e9 zranite\u013enosti<\/a> komunika\u010dnej techniky pou\u017e\u00edvanej v priemysle. Bez ich rie\u0161enia hrozia de\u0161trukt\u00edvne n\u00e1sledky. Postihnut\u00e9 moduly, roz\u0161\u00edren\u00e9 v kritick\u00fdch odvetviach ako voda \u010di energia, m\u00f4\u017eu umo\u017eni\u0165 hackerom prevzatie kontroly a ovplyv\u0148ovanie prev\u00e1dzky a sp\u00f4sobi\u0165 tak v\u00fdpadky. Podobn\u00fa hrozbu v minulosti predstavovala skupina Xenotime s malv\u00e9rom Trisis. CISA varuje organiz\u00e1cie, aby aktualizovali firmware a minimalizovali rizik\u00e1 spojen\u00e9 s touto kritickou zranite\u013enos\u0165ou.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/www.scmagazine.com\/news\/malicious-e-mails-inboxes-q1-2023\" target=\"_blank\" rel=\"noreferrer noopener\">Vy\u0161la anal\u00fdza mailov<\/a>, ktor\u00e9 boli doru\u010den\u00e9 v prvom \u0161tvr\u0165roku 2023. Vy\u0161li z nej zauj\u00edmav\u00e9 inform\u00e1cie, napr\u00edklad, \u017ee takmer 60% zo \u0161kodliv\u00fdch mailov bolo zameran\u00fdch na kr\u00e1de\u017e prihlasovac\u00edch \u00fadajov.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Twitter ako <a href=\"https:\/\/www.scmagazine.com\/news\/researcher-flags-post-elon-data-showing-infosec-twitter-is-dead\" target=\"_blank\" rel=\"noreferrer noopener\">zdroj inform\u00e1ci\u00ed v informa\u010dnej bezpe\u010dnosti<\/a> str\u00e1ca svoj v\u00fdznam. Okrem poklesu po\u010dtu pou\u017e\u00edvate\u013eov do\u0161lo aj k v\u00fdrazn\u00e9mu poklesu spr\u00e1v. Pokles je a\u017e 74% oproti d\u0148u pred k\u00fapou Twitter-u.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>Vy\u0161iel zoznam <a href=\"https:\/\/www.hackread.com\/essential-small-businesses-cybersecurity-tips\/\" target=\"_blank\" rel=\"noreferrer noopener\">10 z\u00e1kladn\u00fdch tipov<\/a> v oblasti kybernetickej bezpe\u010dnosti pre mal\u00e9 firmy.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Pre\u010d\u00edtajte si preh\u013ead noviniek z oblasti kybernetickej bezpe\u010dnosti za j\u00fal 2023. Ka\u017ed\u00fd mesiac v\u00e1m budeme prin\u00e1\u0161a\u0165 bezpe\u010dnostn\u00e9 pr\u00edpady a zauj\u00edmavosti, ktor\u00e9 v\u00e1m pom\u00f4\u017eu zosta\u0165 v bezpe\u010d\u00ed.&nbsp; Politika Pro\u010d\u00ednska hackersk\u00e1 skupina&#8230;<\/p>\n","protected":false},"author":26,"featured_media":27879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[88,142],"tags":[94,423],"class_list":["post-27882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pop-science-sk","category-2023-sk","tag-security-news-sk","tag-cyber-attacks-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security News - J\u00fal 2023 - KInIT<\/title>\n<meta name=\"description\" content=\"Read our roundup of cybersecurity news from July 2023. Each month, we&#039;ll bring you security cases and interesting insights to help you stay secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/security-news-july-2023\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security News - J\u00fal 2023 - KInIT\" \/>\n<meta property=\"og:description\" content=\"Read our roundup of cybersecurity news from July 2023. Each month, we&#039;ll bring you security cases and interesting insights to help you stay secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/security-news-july-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-15T10:56:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-15T11:07:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/08\/July-Web.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"754\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marianna Palkova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@kinit\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marianna Palkova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/\"},\"author\":{\"name\":\"Marianna Palkova\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#\\\/schema\\\/person\\\/8b175aaaf3267b5bbbbb97e4a6db8cea\"},\"headline\":\"Security News &#8211; J\u00fal 2023\",\"datePublished\":\"2023-08-15T10:56:57+00:00\",\"dateModified\":\"2023-08-15T11:07:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/\"},\"wordCount\":1708,\"image\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/July-Web.png\",\"keywords\":[\"security news\",\"cyber attacks\"],\"articleSection\":[\"Pop science\",\"2023\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/\",\"name\":\"Security News - J\u00fal 2023 - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/July-Web.png\",\"datePublished\":\"2023-08-15T10:56:57+00:00\",\"dateModified\":\"2023-08-15T11:07:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#\\\/schema\\\/person\\\/8b175aaaf3267b5bbbbb97e4a6db8cea\"},\"description\":\"Read our roundup of cybersecurity news from July 2023. Each month, we'll bring you security cases and interesting insights to help you stay secure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/July-Web.png\",\"contentUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/July-Web.png\",\"width\":1440,\"height\":754},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/security-news-july-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pop science\",\"item\":\"https:\\\/\\\/kinit.sk\\\/category\\\/pop-science\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security News &#8211; J\u00fal 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#\\\/schema\\\/person\\\/8b175aaaf3267b5bbbbb97e4a6db8cea\",\"name\":\"Marianna Palkova\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security News - J\u00fal 2023 - KInIT","description":"Read our roundup of cybersecurity news from July 2023. Each month, we'll bring you security cases and interesting insights to help you stay secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/","og_locale":"sk_SK","og_type":"article","og_title":"Security News - J\u00fal 2023 - KInIT","og_description":"Read our roundup of cybersecurity news from July 2023. Each month, we'll bring you security cases and interesting insights to help you stay secure.","og_url":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/","og_site_name":"KInIT","article_published_time":"2023-08-15T10:56:57+00:00","article_modified_time":"2023-08-15T11:07:23+00:00","og_image":[{"width":1440,"height":754,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/08\/July-Web.png","type":"image\/png"}],"author":"Marianna Palkova","twitter_card":"summary_large_image","twitter_creator":"@kinit","twitter_site":"@kinit","twitter_misc":{"Autor":"Marianna Palkova","Predpokladan\u00fd \u010das \u010d\u00edtania":"7 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#article","isPartOf":{"@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/"},"author":{"name":"Marianna Palkova","@id":"https:\/\/kinit.sk\/#\/schema\/person\/8b175aaaf3267b5bbbbb97e4a6db8cea"},"headline":"Security News &#8211; J\u00fal 2023","datePublished":"2023-08-15T10:56:57+00:00","dateModified":"2023-08-15T11:07:23+00:00","mainEntityOfPage":{"@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/"},"wordCount":1708,"image":{"@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/08\/July-Web.png","keywords":["security news","cyber attacks"],"articleSection":["Pop science","2023"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/","url":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/","name":"Security News - J\u00fal 2023 - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#primaryimage"},"image":{"@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/08\/July-Web.png","datePublished":"2023-08-15T10:56:57+00:00","dateModified":"2023-08-15T11:07:23+00:00","author":{"@id":"https:\/\/kinit.sk\/#\/schema\/person\/8b175aaaf3267b5bbbbb97e4a6db8cea"},"description":"Read our roundup of cybersecurity news from July 2023. Each month, we'll bring you security cases and interesting insights to help you stay secure.","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/security-news-july-2023\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#primaryimage","url":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/08\/July-Web.png","contentUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/08\/July-Web.png","width":1440,"height":754},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/security-news-july-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/"},{"@type":"ListItem","position":2,"name":"Pop science","item":"https:\/\/kinit.sk\/category\/pop-science\/"},{"@type":"ListItem","position":3,"name":"Security News &#8211; J\u00fal 2023"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Person","@id":"https:\/\/kinit.sk\/#\/schema\/person\/8b175aaaf3267b5bbbbb97e4a6db8cea","name":"Marianna Palkova"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/posts\/27882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/comments?post=27882"}],"version-history":[{"count":3,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/posts\/27882\/revisions"}],"predecessor-version":[{"id":27886,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/posts\/27882\/revisions\/27886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media\/27879"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=27882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=27882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/tags?post=27882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}