Biztonsági szemle
2025. október 2.
Biztonsági szemle
Red Hat Investigates Widespread Breach of Private GitLab Repositories
A threat actor claimed 28,000 private repositories had been compromised, and the Linux software maker said it had "initiated necessary remediation steps."
2025. október 2.
Biztonsági szemle
Cybersecurity Awareness Month: Become a Champion of Digital Resilience
Cybersecurity Awareness Month is here, and so are our tried-and-true offers to help you leap to the forefront of cyber tech. There’s never been a better time to find your place in cybersecurity or take your career to the next level. This month, it’s...
2025. október 2.
Biztonsági szemle
More .well-known Scans, (Thu, Oct 2nd)
I have been writing about the ".well-known" directory a few times before. Recently, about attackers hiding webshells [1], and before that, about the purpose of the directory and why you should set up a "/.well-known/security.txt"...
2025. október 2.
Biztonsági szemle
Phishing Is Moving From Email to Mobile. Is Your Security?
With SMS, voice, and QR-code phishing incidents on the rise, it's time to take a closer look at securing the mobile user.
2025. október 2.
Biztonsági szemle
Building a Digital Backbone: How States Can Modernize Rural Healthcare with RHTP Funding
Discover how states can leverage $50 billion in federal funding to modernize rural healthcare through secure, scalable digital infrastructure—and why timely action is critical to transform care for millions.
2025. október 2.
Biztonsági szemle
Zero Trust: The Foundation of Industrial Cyber Defense
Zero trust architecture reduces industrial cyber risks. Learn how Cisco helps secure OT networks at scale without disrupting production.
2025. október 2.
Biztonsági szemle
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.
2025. október 2.
Biztonsági szemle
Android Spyware in the UAE Masquerades as ... Spyware
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.
2025. október 2.
Biztonsági szemle
ISC Stormcast For Thursday, October 2nd, 2025 https://isc.sans.edu/podcastdetail/9638, (Thu, Oct 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. október 1.
Biztonsági szemle
Google Sheds Light on ShinyHunters' Salesforce Tactics
Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.
2025. október 1.
Biztonsági szemle
Shutdown Threatens US Intel Sharing, Cyber Defense
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.
2025. október 1.
Biztonsági szemle
Exceeding Expectations: How Partner Managed Services and the Cisco 360 Partner Program Accelerate Revenue Growth
Discover how the Cisco 360 Partner Program integrates managed services at its core to boost your profitability, reward growth, and help your MSP business succeed.
Oldalszámozás
- Előző oldal ‹‹
- 111. oldal
- Következő oldal ››