Security Bulletin
18 Jun 2026
Biztonsági szemle
[Virtual Event] Anatomy of a Data Breach: What to Do if it Happens to You
22 May 2026
Biztonsági szemle
Accelerating Enterprise-Scale AI Development & Experimentation
As AI continues to transform the enterprise landscape, the challenge for large organizations isn't just adopting the technology—it’s scaling it effectively. At Cisco, we recognized that while our teams were eager to build Retrieval-Augmented........
22 May 2026
Biztonsági szemle
Cisco’s Risk-Based Vulnerability Disclosure in the Age of AI
Discover how Cisco is evolving its vulnerability disclosure practices. We are leveraging AI to prioritize high-risk security issues, helping customers focus on critical patching and remediation efforts.
22 May 2026
Biztonsági szemle
Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise Browsers
When Akamai announced its LayerX acquisition, the company joined a growing list of vendors adding secure enterprise browsers to their product portfolios.
22 May 2026
Biztonsági szemle
Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks
Ransomware and vendor breaches persist, but the 2026 Data Breach Investigations Report (DBIR) highlights how evolving social engineering tactics make the sector more vulnerable.
22 May 2026
Biztonsági szemle
China's Webworm Uses Discord, Microsoft Graphs to Hack EU Govts.
The advanced persistent threat group also relied on SOCKS proxies like SoftEther VPN, tunneling tools that act as a middleman between victim and attacker.
22 May 2026
Biztonsági szemle
Sajtószemle – 2026. 21. hét
Megjelent a 2026. 21. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2026.05.15. és 2026.05.21. között kezelt incidensek, valamint az elosztott kormányzati IT biztonsági csapdarendszerből (GovProbe1) származó adatok statisztikai eloszlását is...
22 May 2026
Biztonsági szemle
Cross-Platform NPM Stealer, (Fri, May 22nd)
I found a Node.js stealer that looked pretty well obfuscated. The file was not running out-of-the-box because it was uploaded on VT as âextracted-decoded.jsâ (and reformated). The SHA256 is...
22 May 2026
Biztonsági szemle
ISC Stormcast For Friday, May 22nd, 2026 https://isc.sans.edu/podcastdetail/9942, (Fri, May 22nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
21 May 2026
Biztonsági szemle
How CISOs Should Prep for Agentic-Ready AI BOMs
Finding ways to document both component and execution attributes for AI bill of materials (AI BOM).
21 May 2026
Biztonsági szemle
Google API Keys Remain Active After Deletion
A security researcher discovered the API keys can still be used for 23 minutes after deletion, even though the cloud provider claims deletion is immediate.
Pagination
- Page 1
- Next page ››