{"id":2528,"date":"2024-07-12T18:39:23","date_gmt":"2024-07-12T18:39:23","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2528"},"modified":"2024-07-12T18:43:13","modified_gmt":"2024-07-12T18:43:13","slug":"a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget\/","title":{"rendered":"A CISA figyelmeztet\u00e9se a Red Team tev\u00e9kenys\u00e9g\u00e9r\u0151l hangs\u00falyozza a m\u00e9lys\u00e9gi v\u00e9delem sz\u00fcks\u00e9gess\u00e9g\u00e9t"},"content":{"rendered":"<p>A Kiberbiztons\u00e1gi \u00e9s Infrastrukt\u00fara Biztons\u00e1gi \u00dcgyn\u00f6ks\u00e9g egy nagyon r\u00e9szletes tan\u00e1csad\u00e1st tett k\u00f6zz\u00e9 \u201cA CISA Red Team m\u0171veletei egy sz\u00f6vets\u00e9gi civil v\u00e9grehajt\u00f3 \u00e1gazati szervezet ellen kiemelik a m\u00e9lys\u00e9gi v\u00e9delem sz\u00fcks\u00e9gess\u00e9g\u00e9t\u201d c\u00edmmel. A tan\u00e1csad\u00e1s egy 2023-ban v\u00e9gzett m\u00e9lyrehat\u00f3 \u00e9rt\u00e9kel\u00e9sen alapult, bele\u00e9rtve a red team \u00e1ltal alkalmazott TTP-ket. Ezek a meg\u00e1llap\u00edt\u00e1sok \u00e9s aj\u00e1nl\u00e1sok seg\u00edtenek a vezet\u0151knek, vezet\u0151knek \u00e9s h\u00e1l\u00f3zatv\u00e9d\u0151knek a kiberbiztons\u00e1g jav\u00edt\u00e1s\u00e1ban.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"key-findings-and-lessons-learned\"><strong>Kulcsfontoss\u00e1g\u00fa meg\u00e1llap\u00edt\u00e1sok \u00e9s tanuls\u00e1gok<\/strong><\/h2>\n\n\n<p>A tan\u00e1csad\u00e1s szerint kritikus betekint\u00e9sek \u00e9s tanuls\u00e1gok sz\u00e1rmaznak az \u00e9rt\u00e9kel\u00e9sb\u0151l a robusztus m\u00e9lys\u00e9gi v\u00e9delem strat\u00e9gi\u00e1k megval\u00f3s\u00edt\u00e1s\u00e1ban. A red team \u00e1ltal haszn\u00e1lt kulcsfontoss\u00e1g\u00fa taktik\u00e1k \u00e9s technik\u00e1k a k\u00f6vetkez\u0151k:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Szimul\u00e1lt fejlett tart\u00f3s fenyeget\u00e9s vektorok, amelyek a h\u00e1l\u00f3zat ellen\u00e1ll\u00f3 k\u00e9pess\u00e9g\u00e9t tesztelik,<\/li>\n\n\n\n<li>Gyenge h\u00e1l\u00f3zati szegment\u00e1ci\u00f3 kihaszn\u00e1l\u00e1sa \u00e9s<\/li>\n\n\n\n<li>Kifinomult spear-phishing az els\u0151dleges hozz\u00e1f\u00e9r\u00e9shez.<\/li>\n<\/ul>\n\n\n\n<p>Ezek az eredm\u00e9nyek hangs\u00falyozz\u00e1k a szervezetek k\u00e9pess\u00e9g\u00e9t a t\u00f6bbr\u00e9teg\u0171 biztons\u00e1gi int\u00e9zked\u00e9sek alkalmaz\u00e1s\u00e1ra annak \u00e9rdek\u00e9ben, hogy hat\u00e9konyan ellens\u00falyozz\u00e1k az ilyen fenyeget\u00e9seket.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-improve-cybersecurity\"><strong>Aj\u00e1nl\u00e1sok a kiberbiztons\u00e1g jav\u00edt\u00e1s\u00e1ra<\/strong><\/h2>\n\n\n<p>A CISA a tan\u00e1csad\u00e1sa r\u00e9v\u00e9n k\u00fcl\u00f6nf\u00e9le aj\u00e1nl\u00e1sokat k\u00edn\u00e1l, amelyek jav\u00edtj\u00e1k a kiberbiztons\u00e1got, a felismer\u00e9st, a reag\u00e1l\u00e1st \u00e9s a vad\u00e1szat k\u00e9pess\u00e9geit, amelyek a k\u00f6vetkez\u0151ket tartalmazz\u00e1k:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Val\u00f3s\u00edtsa meg a m\u00e9lys\u00e9gi v\u00e9delmet: <\/b>Egy olyan koncepci\u00f3, ahol t\u00f6bb r\u00e9teg\u0171 biztons\u00e1gi ellen\u0151rz\u00e9seket kell megval\u00f3s\u00edtani egy IT k\u00f6rnyezetben a potenci\u00e1lis kiberfenyeget\u00e9sek \u00e9s t\u00e1mad\u00e1sok elleni v\u00e9delem \u00e9rdek\u00e9ben.<\/li>\n\n\n\n<li><strong>Haszn\u00e1ljon robusztus h\u00e1l\u00f3zati szegment\u00e1ci\u00f3t:<\/strong> A h\u00e1l\u00f3zati szegment\u00e1ci\u00f3 a h\u00e1l\u00f3zat k\u00fcl\u00f6nb\u00f6z\u0151 szegmensekre bont\u00e1s\u00e1t jelenti, hogy a t\u00e1mad\u00e1s terjed\u00e9se neh\u00e9z legyen, \u00e9s \u00edgy k\u00f6nnyen kezelhet\u0151 legyen egy megs\u00e9rt\u00e9s eset\u00e9n.<\/li>\n\n\n\n<li><strong>Alapvonalak l\u00e9trehoz\u00e1sa:<\/strong> Val\u00f3s\u00edtson meg alapvonalakat a h\u00e1l\u00f3zati forgalom, az alkalmaz\u00e1s v\u00e9grehajt\u00e1sa \u00e9s a fi\u00f3k hiteles\u00edt\u00e9se ter\u00e9n, hogy azonos\u00edtsa az anom\u00e1li\u00e1kat, amelyek behatol\u00e1sokra utalnak.<\/li>\n<\/ul>\n\n\n\n<p>Ezek seg\u00edtenek a szervezeteknek visszaverni a fejlett kibert\u00e1mad\u00e1sokat \u00e9s jav\u00edtani az \u00e1ltal\u00e1nos biztons\u00e1gi helyzet\u00fcket.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"importance-of-the-cisas-crosssector-cybersecurity-performance-goals\"><strong>A CISA kereszt\u00e1gazati kiberbiztons\u00e1gi teljes\u00edtm\u00e9nyc\u00e9lok fontoss\u00e1ga<\/strong><\/h2>\n\n\n<p>A dokumentum szerint a k\u00f6z\u00f6s \u00e9s hat\u00e1sos fenyeget\u00e9sek, taktik\u00e1k, technik\u00e1k \u00e9s elj\u00e1r\u00e1sok azonos\u00edt\u00e1s\u00e1hoz sz\u00fcks\u00e9ges forr\u00e1sok megtal\u00e1lhat\u00f3k a CISA kereszt\u00e1gazati kiberbiztons\u00e1gi teljes\u00edtm\u00e9nyc\u00e9ljaiban. Ezek a c\u00e9lok a k\u00f6vetkez\u0151ket hivatottak el\u00e9rni:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Olyan kiberbiztons\u00e1gi gyakorlatok alapvonal\u00e1t biztos\u00edtj\u00e1k, amelyek alkalmazhat\u00f3k a kritikus infrastrukt\u00far\u00e1k k\u00f6r\u00e9ben;<\/li>\n\n\n\n<li>M\u00e9r\u0151sz\u00e1mokat biztos\u00edtanak a kiberbiztons\u00e1gi \u00e9retts\u00e9g m\u00e9r\u00e9s\u00e9re \u00e9s jav\u00edt\u00e1s\u00e1ra;<\/li>\n\n\n\n<li>Aj\u00e1nlott gyakorlatokat kombin\u00e1lnak mind az inform\u00e1ci\u00f3s technol\u00f3gia, mind az operat\u00edv technol\u00f3gia tulajdonosai sz\u00e1m\u00e1ra;<\/li>\n\n\n\n<li>A<em>Nemzeti biztons\u00e1gi kock\u00e1zatokat kezelnek az egyes entit\u00e1sok kock\u00e1zatain t\u00fal<\/em><\/li>\n<\/ul>\n\n\n\n<p>A CPG-k, az ipar\u00e1gi szak\u00e9rt\u0151k \u00e9s korm\u00e1nyzati tisztvisel\u0151k m\u00e9lyrehat\u00f3 konzult\u00e1ci\u00f3j\u00e1val, kiv\u00e1laszt\u00e1sra ker\u00fcltek, hogy seg\u00edtsenek a kis- \u00e9s k\u00f6z\u00e9pv\u00e1llalkoz\u00e1soknak a kiberbiztons\u00e1gi int\u00e9zked\u00e9sekbe val\u00f3 befektet\u00e9sben, amelyek magas hat\u00e1s\u00fa biztons\u00e1gi eredm\u00e9nyeket hoznak.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"nists-cybersecurity-framework-alignment\"><strong>A NIST kiberbiztons\u00e1gi keretrendszer\u00e9nek igaz\u00edt\u00e1sa<\/strong><\/h2>\n\n\n<p>A CISA CPG-k igazodnak a NIST CSF funkci\u00f3ihoz. Ezek a funkci\u00f3k a k\u00f6vetkez\u0151k:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ir\u00e1ny\u00edt\u00e1s:<\/strong> Az elv\u00e1r\u00e1sok \u00e9s a kock\u00e1zatkezel\u00e9si strat\u00e9gia meg\u00e1llap\u00edt\u00e1sa, kommunik\u00e1l\u00e1sa \u00e9s nyomon k\u00f6vet\u00e9se a szervezet sz\u00e1m\u00e1ra.<\/li>\n\n\n\n<li><strong>Azonos\u00edt\u00e1s:<\/strong> A szervezet jelenlegi kiberbiztons\u00e1gi kock\u00e1zatainak meg\u00e9rt\u00e9se.<\/li>\n\n\n\n<li><strong>V\u00e9delem:<\/strong> V\u00e9delmi int\u00e9zked\u00e9sek v\u00e9grehajt\u00e1sa a szervezet kiberbiztons\u00e1gi kock\u00e1zatainak kezel\u00e9s\u00e9re.<\/li>\n\n\n\n<li><strong>\u00c9szlel\u00e9s:<\/strong> Lehets\u00e9ges kibert\u00e1mad\u00e1sok \u00e9s kompromisszumok felder\u00edt\u00e9se \u00e9s elemz\u00e9se.<\/li>\n\n\n\n<li><strong>V\u00e1lasz:<\/strong> A felismert kiberbiztons\u00e1gi incidensekre val\u00f3 reag\u00e1l\u00e1s.<\/li>\n\n\n\n<li><strong>Helyre\u00e1ll\u00edt\u00e1s:<\/strong> A kiberbiztons\u00e1gi incidens \u00e1ltal \u00e9rintett rendszerek, eszk\u00f6z\u00f6k \u00e9s m\u0171veletek helyre\u00e1ll\u00edt\u00e1sa.<\/li>\n<\/ul>\n\n\n\n<p>A CISA dolgozik a CPG-k \u00e1tdolgoz\u00e1s\u00e1n, hogy azok megfeleljenek a NIST CSF 2.0 verzi\u00f3j\u00e1nak, \u00edgy relev\u00e1nsak \u00e9s hasznosak maradjanak a dinamikus, folyamatosan fejl\u0151d\u0151 kiberbiztons\u00e1gi k\u00f6rnyezetben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u00f6vetkeztet\u00e9s<\/strong><\/h2>\n\n\n<p>A CISA leg\u00fajabb tan\u00e1csad\u00e1sa eml\u00e9keztet\u0151\u00fcl szolg\u00e1l arra, hogy legyenek m\u00e9lys\u00e9gi v\u00e9delem strat\u00e9gi\u00e1k \u00e9rv\u00e9nyben, \u00e9s alkalmazzanak j\u00f3 kiberbiztons\u00e1gi gyakorlatokat. Az aj\u00e1nl\u00e1sok \u00e9s a CPG-k seg\u00edtenek a kiberbiztons\u00e1gi \u00e1ll\u00e1spont meger\u0151s\u00edt\u00e9s\u00e9ben a felmer\u00fcl\u0151 fenyeget\u00e9sekkel szemben.<\/p>\n\n\n\n<p>Tov\u00e1bbi inform\u00e1ci\u00f3k\u00e9rt k\u00e9rj\u00fck, l\u00e1togasson el a CISA weboldal\u00e1ra: <strong><a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener\">Biztons\u00e1g tervez\u00e9ssel<\/a><\/strong> a teljes tan\u00e1csad\u00e1s \u00e9s egy\u00e9b forr\u00e1sok \u00e9rdek\u00e9ben.<\/p>","protected":false},"excerpt":{"rendered":"<p>A Kiberbiztons\u00e1gi \u00e9s Infrastrukt\u00fara Biztons\u00e1gi \u00dcgyn\u00f6ks\u00e9g nagyon r\u00e9szletes tan\u00e1csad\u00e1st tett k\u00f6zz\u00e9 \u201cA CISA Red Team m\u0171veletei egy sz\u00f6vets\u00e9gi polg\u00e1ri v\u00e9grehajt\u00f3 \u00e1gazati szervezet ellen kiemelik a m\u00e9lys\u00e9gi v\u00e9delem sz\u00fcks\u00e9gess\u00e9g\u00e9t\u201d c\u00edmmel. A tan\u00e1csad\u00e1s\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A CISA figyelmeztet\u00e9se a Red Team tev\u00e9kenys\u00e9g\u00e9r\u0151l hangs\u00falyozza a m\u00e9lys\u00e9gi v\u00e9delem sz\u00fcks\u00e9gess\u00e9g\u00e9t<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,27],"tags":[],"class_list":["post-2528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Continue reading CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"articleSection\":[\"cybersecurity\",\"Security\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"width\":1265,\"height\":422,\"caption\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A CISA figyelmeztet\u00e9se a Red Team tev\u00e9kenys\u00e9g\u00e9r\u0151l hangs\u00falyozza a m\u00e9lys\u00e9gi v\u00e9delem sz\u00fcks\u00e9gess\u00e9g\u00e9t | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget\/","og_locale":"hu_HU","og_type":"article","og_title":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Continue reading CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-cisa-figyelmeztetese-a-voros-csapat-tevekenysegerol-hangsulyozza-a-melysegi-vedelem-szuksegesseget\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:39:23+00:00","article_modified_time":"2024-07-12T18:43:13+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"3 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"wordCount":535,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","articleSection":["cybersecurity","Security"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","name":"A CISA figyelmeztet\u00e9se a Red Team tev\u00e9kenys\u00e9g\u00e9r\u0151l hangs\u00falyozza a m\u00e9lys\u00e9gi v\u00e9delem sz\u00fcks\u00e9gess\u00e9g\u00e9t | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","width":1265,"height":422,"caption":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=2528"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/2528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/2531"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=2528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=2528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=2528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}