Security Bulletin

1 May 2025
Biztonsági szemle
Scaling the Cisco AI Assistant for Support with Splunk
Cisco needed to scale its virtual support engineer that assists its technical support teams around the world. By leveraging its own Splunk technology, Cisco was able to scale the AI assistant to… Read more on Cisco Blogs

1 May 2025
Biztonsági szemle
Embracing a Passwordless Future: Cisco’s Journey to Seamless Authentication with Duo Passwordless
Cisco IT needed to secure its workforce in a zero trust, user-friendly way that would allow its 130,000 users to securely work anywhere, from any device, without friction. By leveraging its own Duo Passwordless, the team was able to eliminate...
1 May 2025
Biztonsági szemle
MicroDicom DICOM Viewer
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: MicroDicom Equipment: DICOM Viewer Vulnerabilities: Out-of-Bounds Write, Out-of-Bounds Read 2. RISK EVALUATION Successful exploitation of these...
1 May 2025
Biztonsági szemle
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-38475 Apache HTTP Server Improper Escaping of Output Vulnerability CVE-2023-44221 SonicWall SMA100 Appliances OS...
1 May 2025
Biztonsági szemle
KUNBUS GmbH Revolution Pi
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: KUNBUS Equipment: Revolution Pi Vulnerabilities: Missing Authentication for Critical Function, Authentication Bypass by Primary Weakness...
1 May 2025
Biztonsági szemle
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on May 1, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-121-01 KUNBUS GmbH Revolution Pi ICSMA-25...

1 May 2025
Biztonsági szemle
How CIS Hardened Images secure systems and reduce costs
CIS Hardened Images are virtual machine images hardened with the globally recognized secure configuration recommendations of the CIS Benchmarks.

1 May 2025
Biztonsági szemle
Steganography Analysis With pngdump.py: Bitstreams, (Thu, May 1st)
A friend asked me if my pngdump.py tool can extract individual bits from an image (cfr. diary entry " Steganography Analysis With pngdump.py").

1 May 2025
Biztonsági szemle
ISC Stormcast For Thursday, May 1st, 2025 https://isc.sans.edu/podcastdetail/9432, (Thu, May 1st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

1 May 2025
Biztonsági szemle
RSAC: AI may force a reboot of America's identity system
Deepfakes and other forms of generative AI may be the catalysts to force a restructuring of the entire U.S. identity system.

1 May 2025
Biztonsági szemle
Billbug Expands Cyber-Espionage Campaign in Southeast Asia
The China-linked cyber-operations group, better known as Lotus Panda, uses its own custom malware to focus on government agencies and private companies in Hong Kong, the Philippines, Taiwan, and Vietnam.

1 May 2025
Biztonsági szemle
RSAC 2025: Vishing defenses that go beyond training
Voice firewalls, call authentication and real-time fraud detection offer robust vishing prevention.
Pagination
- Previous page ‹‹
- Page 115
- Next page ››