Security Bulletin
3 Jun 2024
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2017-3506 Oracle WebLogic Server OS Command Injection Vulnerability These types of vulnerabilities are frequent attack...
![](/sites/default/files/styles/narrow_1x/public/feeds/86/20240603-121829.png.webp?itok=b76yEocl)
3 Jun 2024
Biztonsági szemle
A Wireshark Lua Dissector for Fixed Field Length Protocols, (Mon, Jun 3rd)
I developed a Wireshark dissector in Lua to parse binary protocols (over TCP) that are composed of fields with fixed lengths. I got this idea while taking a SANS ICS training: for protocol reversing, it would be useful to have a dissector where I can...
![APIs](/sites/default/files/styles/narrow_1x/public/feeds/73/053025_api.jpg.webp?itok=_webCmMr)
3 Jun 2024
Biztonsági szemle
Three ways to deliver API security
Here are three ways to build APIs that deliver the functionality and security modern organizations need.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
3 Jun 2024
Biztonsági szemle
Improved Guidance for Azure Network Service Tags
Summary Microsoft Security Response Center (MSRC) was notified in January 2024 by our industry partner, Tenable Inc., about the potential for cross-tenant access to web resources using the service tags feature. Microsoft acknowledged that Tenable...
![](/sites/default/files/styles/narrow_1x/public/feeds/bb/Mehaniq-kenya-cyber-code-shutterstock.jpg.webp?itok=F3gX_-_H)
3 Jun 2024
Biztonsági szemle
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
3 Jun 2024
Biztonsági szemle
ISC Stormcast For Monday, June 3rd, 2024 https://isc.sans.edu/podcastdetail/9006, (Mon, Jun 3rd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/63/CDO.jpg.webp?itok=2wu1zfb5)
2 Jun 2024
Biztonsági szemle
Cisco Defense Orchestrator’s Path to FedRAMP Authorization
Join us as we shed some light on the status and processes involved for achieving FedRAMP® Authorization for Cisco Defense Orchestrator (CDO).
![](/sites/default/files/styles/narrow_1x/public/feeds/c4/Blog-Feature-Images-3-scaled.jpg.webp?itok=wZkWIpO9)
1 Jun 2024
Biztonsági szemle
For the Love of Learning: We’re Here for You at Cisco Live 2024 Las Vegas!
As thousands make their way to Las Vegas for Cisco Live 2024, go beyond the love of learning and discover a unified, holistic learning experience in the all-new Up-Skill Hub, where you'll find the Learning & Certifications booth and the DevNet Zone...
![<p>(Credit: AdriaVidal – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/70/AdobeStock_603723456_Editorial_Use_Only.jpg.webp?itok=mqaFxLNC)
31 May 2024
Biztonsági szemle
OpenAI report reveals threat actors using ChatGPT in influence operations
The report details OpenAI’s disruption of the deceptive campaigns, which had minimal public impact.
![](/sites/default/files/styles/narrow_1x/public/feeds/00/magnifyingglass_Brain_light_Alamy_Stock_Photo.jpg.webp?itok=OyjUk9jz)
31 May 2024
Biztonsági szemle
Lawyers Ask Forensics Investigators for Help Outside Cybersecurity
Attorneys are increasingly realizing that forensics investigators have skills analyzing documents and uncovering digital clues that could help them in non-cybersecurity cases.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/blog-1.jpg.webp?itok=zUeap8Um)
31 May 2024
Biztonsági szemle
Nexus Dashboard Essentials: Learn How to Manage Your Data Center Fabric Like a Pro
Go from novice to pro-level prowess with the Cisco Data Center Nexus Dashboard Essentials | DCNDE Learning Path in Cisco U., free through July 8, 2024, during Rev Up to Recert: Nexus Dashboard.
![](/sites/default/files/styles/narrow_1x/public/feeds/20/squid-Stocktrek-images-alamy.jpg.webp?itok=U2mZxJsA)
31 May 2024
Biztonsági szemle
LilacSquid APT Employs Open Source Tools, QuasarRAT
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
Pagination
- Previous page ‹‹
- Page 106
- Next page ››