Biztonsági szemle
2025. május 21.
Biztonsági szemle
Dark Reading Confidential: The Day I Found an APT Group in the Most Unlikely Place
Dark Reading Confidential Episode 6: Threat hunters Ismael Valenzuela and Vitor Ventura share stories about the tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way.
2025. május 21.
Biztonsági szemle
Connecting a New Generation of Moving Assets with Cisco Ultra-Reliable Wireless Backhaul
Aterpa leverages Ultra-Reliable Wireless Backhaul (URWB) for teleremote operations, ensuring the safe decommissioning of dams.
2025. május 21.
Biztonsági szemle
Strider launches real-time threat detection upgrades
SiliconANGLE reports that Strider Technologies has rolled out major enhancements to its AI-powered threat intelligence engine, Spark, aiming to help organizations counter threats from state-sponsored actors with greater speed and accuracy.
2025. május 21.
Biztonsági szemle
China-linked operative exposed at U.S. university
An investigation has revealed that a Chinese intelligence agent posing as a Stanford University student attempted to infiltrate academic circles researching China-related issues and advanced technologies, including artificial intelligence, reports...
2025. május 21.
Biztonsági szemle
Survey finds gaps in cyber threat intel sharing
A new survey conducted by Cyware at the RSA Conference 2025 highlights a significant disconnect between cybersecurity professionals belief in collaboration and the operational reality of threat intelligence sharing, according to BetaNews.
2025. május 21.
Biztonsági szemle
Push launches global advisor network for identity security
Push Security has introduced the Push Security Advisor Network, a global partner initiative designed to address identity-based threats that traditional perimeter defenses increasingly fail to contain, reports ChannelE2E.
2025. május 21.
Biztonsági szemle
Google flags malicious use of Linux .desktop files
Google Threat Intelligence has exposed a new cyberattack method exploiting .desktop files, typically benign configuration files in Linux environments, to deploy malware through system-level commands and browser redirection, GBHackers News reports.
2025. május 21.
Biztonsági szemle
AI investments on the rise amid increased risk concerns
Escalating concerns regarding cybersecurity risks associated with generative artificial intelligence have prompted 73% of organizations to make AI-specific security tool investments, Infosecurity Magazine reports.
2025. május 21.
Biztonsági szemle
Improved US cyber-focused foreign aid sought by tech firm coalition
The U.S. government has been urged by the new Strategic Cybersecurity Coalition which includes Google Cloud, Dell Technologies, Forescout, Carahsoft, Velo, and Trellix to strengthen its cybersecurity-focused aid to foreign partners, which are being...
2025. május 21.
Biztonsági szemle
Guilty plea entered by PowerSchool hacker
Massachusetts teen Matthew Lane has admitted guilt over his involvement in the massive attack against online education software provider PowerSchool in December, according to NBC News.
2025. május 21.
Biztonsági szemle
VanHelsing RaaS reveals source code after attempted exposure
BleepingComputer reports that the newly emergent VanHelsing ransomware-as-a-service operation has released its affiliate panel, data leak site, and Windows encryptor source codes after "th30c0der", one of its old developers, attempted to peddle such...
2025. május 21.
Biztonsági szemle
The future of energy: How innovation and infrastructure are needed to respond to AI growth
Learn how we can meet the rising need for energy, not only from artificial intelligence (AI), but from other digital technologies and the electrification of industries.
Oldalszámozás
- Előző oldal ‹‹
- 260. oldal
- Következő oldal ››