Biztonsági szemle

2025. Aug. 4.
Biztonsági szemle
42% of Developers Using AI Say Their Codebase is Now Mostly AI-Generated

2025. Aug. 4.
Biztonsági szemle
New Feature: Daily Trends Report, (Mon, Aug 4th)
I implemented a new report today, the "Daily Trends" report. It summarizes noteworthy data received from our honeypot. As with everything, it will improve if you provide feedback :)

2025. Aug. 4.
Biztonsági szemle
How Nestlé Revamped Its Network for Resilience and Efficiency
Learn how updating to Cisco SD-WAN, Cisco ThousandEyes, and Cisco Secure Routers helped Nestlé manage its global network with greater efficiency and resilience.

2025. Aug. 4.
Biztonsági szemle
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
An uptick of ransomware activity by the group in late July that uses the vendor's SSL VPN devices for initial intrusion shows evidence of an as-yet-undisclosed flaw under exploitation.

2025. Aug. 4.
Biztonsági szemle
Turning Human Vulnerability Into Organizational Strength
Investing in building a human-centric defense involves a combination of adaptive security awareness training, a vigilant and skeptical culture, and the deployment of layered technical controls.

2025. Aug. 4.
Biztonsági szemle
ISC Stormcast For Monday, August 4th, 2025 https://isc.sans.edu/podcastdetail/9554, (Mon, Aug 4th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Aug. 3.
Biztonsági szemle
Legacy May Kill, (Sun, Aug 3rd)
Just saw something that I thought was long gone. The username "pop3user" is showing up in our telnet/ssh logs. I don't know how long ago it was that I used POP3 to retrieve e-mail from one of my mail servers. IMAP and various webmail systems...

2025. Aug. 2.
Biztonsági szemle
What Is the Role of Provable Randomness in Cybersecurity?
Random numbers are the cornerstone of cryptographic security — cryptography depends on generating random keys. As organizations adopt quantum-resistant algorithms, it's equally important to examine the randomness underpinning them

2025. Aug. 1.
Biztonsági szemle
Dark Reading News Desk Turns 10, Back at Black Hat USA for 2025
Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that help you stay up on the latest research from Black Hat — no trip to Las Vegas required.

2025. Aug. 1.
Biztonsági szemle
Gearing up for Black Hat USA 2025
As a technical advocate focused on cybersecurity in Learn with Cisco, my mission is to empower our community with the knowledge and tools to thrive in today’s ever-evolving landscape. Few cybersecurity events embody the spirit of innovation and...

2025. Aug. 1.
Biztonsági szemle
LLMs' AI-Generated Code Remains Wildly Insecure
Security debt ahoy: only about half of the code that the latest large language models (LLMs) create is cybersecure, and more and more of it is being created all the time.

2025. Aug. 1.
Biztonsági szemle
Building the Perfect Post-Security Incident Review Playbook
By creating a safe environment for open discussion, prioritizing human context alongside technical data, and involving diverse stakeholders, organizations can turn security incidents into accelerators of resilience.
Oldalszámozás
- Előző oldal ‹‹
- 8. oldal
- Következő oldal ››