Biztonsági szemle

2025. Júl. 16.
Biztonsági szemle
ISC Stormcast For Wednesday, July 16th, 2025 https://isc.sans.edu/podcastdetail/9528, (Wed, Jul 16th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Júl. 16.
Biztonsági szemle
Altered Telegram App Steals Chinese Users' Android Data
Using more than 600 domains, attackers entice Chinese-speaking victims to download a vulnerable Telegram app that is nearly undetectable on older versions of Android.

2025. Júl. 16.
Biztonsági szemle
Meet Belkie: Your 45-Second CCNA Certification Coach
Prepping for the CCNA? This new series will walk you through all the things you didn't know you didn't know.

2025. Júl. 15.
Biztonsági szemle
ISC2 Finds Orgs Are Increasingly Leaning on AI
While many organizations are eagerly integrating AI into their workflows and cybersecurity practices, some remain undecided and even concerned about potential drawbacks of AI deployment.

2025. Júl. 15.
Biztonsági szemle
Lessons Learned From McDonald's Big AI Flub
McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to approximately 64 million job applicants.

2025. Júl. 15.
Biztonsági szemle
AI Is Reshaping How Attorneys Practice Law
Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly AI-influenced courtroom.

2025. Júl. 15.
Biztonsági szemle
AsyncRAT Spawns Concerning Labyrinth of Forks
Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprint of variants available across the spectrum of functionality.

2025. Júl. 15.
Biztonsági szemle
Leading Through Change: How Cisco DevNet Engineering Sustained Excellence Amid Disruption
Purpose and What to Expect from this Blog Cisco DevNet Engineering underwent one of the most disruptive periods in its history in the past year. Facing leadership transitions, organizational realignment, and consequential Limited restructuring (LR)...

2025. Júl. 15.
Biztonsági szemle
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.

2025. Júl. 15.
Biztonsági szemle
5 Ways Wi-Fi 7 Elevates the Guest Experience with Smart Hospitality
Discover how Wi-Fi 7 revolutionizes hospitality with seamless, high-speed connectivity, powering smart devices and enhancing guest experiences with Cisco solutions.

2025. Júl. 15.
Biztonsági szemle
Public Sector Highlights: Key Takeaways and Success Stories from Cisco Live US 2025
Explore how public sector organizations are accelerating innovation, security, and sustainability with the top three takeaways from Cisco Live US 2025.

2025. Júl. 15.
Biztonsági szemle
How Criminal Networks Exploit Insider Vulnerabilities
Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.
Oldalszámozás
- Előző oldal ‹‹
- 26. oldal
- Következő oldal ››