Biztonsági szemle
2025. Nov. 5.
Biztonsági szemle
The Future of Collaboration is Here: Cisco CCNP Collaboration Updates
What CCNP Collaboration learners need to know about Cisco's 2026 certification updates.
2025. Nov. 5.
Biztonsági szemle
Operational Technology Security Poses Inherent Risks for Manufacturers
Despite increased awareness, manufacturers continue to face an onslaught of attacks.
2025. Nov. 5.
Biztonsági szemle
Critical Site Takeover Flaw Affects 400K WordPress Sites
Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and website for nefarious purposes.
2025. Nov. 5.
Biztonsági szemle
Death by a Thousand Prompts: Open Model Vulnerability Analysis
AI models have become increasingly democratized, and the proliferation and adoption of open weight models has contributed significantly to this reality. Open-weight models provide researchers,… Read more on Cisco Blogs
2025. Nov. 5.
Biztonsági szemle
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.
2025. Nov. 5.
Biztonsági szemle
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any...
2025. Nov. 5.
Biztonsági szemle
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
2025. Nov. 5.
Biztonsági szemle
ISC Stormcast For Wednesday, November 5th, 2025 https://isc.sans.edu/podcastdetail/9686, (Wed, Nov 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. Nov. 5.
Biztonsági szemle
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
2025. Nov. 4.
Biztonsági szemle
AI App Spending Report: Where Are the Security Tools?
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
2025. Nov. 4.
Biztonsági szemle
Pro-Russian Hackers Use Linux VMs to Hide in Windows
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
2025. Nov. 4.
Biztonsági szemle
Inside the Playbook of Ransomware's Most Profitable Players
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.
Oldalszámozás
- Előző oldal ‹‹
- 25. oldal
- Következő oldal ››