Security Bulletin

27 May 2025
Biztonsági szemle
DragonForce Ransomware Strikes MSP in Supply Chain Attack
DragonForce, a ransomware "cartel" that has gained significant popularity since its debut in 2023, attacked an MSP as part of a recent supply chain attack, via known SimpleHelp bugs.

27 May 2025
Biztonsági szemle
MathWorks, Creator of MATLAB, Confirms Ransomware Attack
The attack dirsupted MathWorks' systems and online applications, but it remains unclear which ransomware group targeted the software company and whether they stole any data.

27 May 2025
Biztonsági szemle
The future of IT starts with automation: How workflow builders are transforming teams
Workflow automation is no longer a luxury—it’s a strategic imperative that empowers IT teams to scale efficiently, reduce errors, and focus on high-impact work through intuitive, AI-powered tools.

27 May 2025
Biztonsági szemle
FBI: Silent Ransom Group Adopts Vishing Campaign Against Law Firms
The non-ransomware extortion group has switched up tactics and victimology in a deliberate and focused campaign similar to those of other attackers focused on stealing sensitive data.

27 May 2025
Biztonsági szemle
Customer Experience is Ready to Engage at Cisco Live
See what the CX Marketing team has in store for Cisco Live in San Diego!

27 May 2025
Biztonsági szemle
How the New Hacker Millionaire Class Was Built
Once dismissed as Internet miscreants in hoodies, ethical hackers have hit the big time, earning millions from blue-chip firms. And they say it's their diverse backgrounds that make them top-tier bug hunters.

27 May 2025
Biztonsági szemle
Danabot Takedown Deals Blow to Russian Cybercrime
A multiyear investigation by a public-private partnership has resulted in the seizure of the botnet's US-based infrastructure and indictments for its key players, significantly disrupting a vast cybercriminal enterprise.

27 May 2025
Biztonsági szemle
Securing Your SSH authorized_keys File, (Tue, May 27th)
This is nothing "amazingly new", but more of a reminder to secure your "authorized_keys" file for SSH. One of the first things I see even simple bots do to obtain persistent access to a UNIX system is to add a key to the authorized_keys file of...

27 May 2025
Biztonsági szemle
Learn with Cisco: Evolving for the Age of AI, Automation, and Cloud
Learn about important changes to DevNet, Cybersecurity, and Collaboration Specialist Certifications coming in February 2026.

27 May 2025
Biztonsági szemle
CVE Uncertainty Underlines Importance of Cyber Resilience
Organizations need to broaden their strategy to manage vulnerabilities more effectively and strengthen network cyber resilience.

27 May 2025
Biztonsági szemle
Cisco Country Digital Acceleration: A Decade of Empowering Nations Through Digital Transformation
In every corner of the globe, digital technology is becoming the bridge to opportunity, empowerment, and transformation. Cisco’s Country Digital Acceleration (CDA) program is at the forefront of this movement, revolutionizing how communities connect...

27 May 2025
Biztonsági szemle
Exabeam, Vectra AI partner to tackle cloud threats
This collaboration merges Exabeam’s New-Scale Security Operations Platform, featuring SIEM, UEBA, and automation, with Vectra AI’s advanced network detection and response tools.
Pagination
- Previous page ‹‹
- Page 116
- Next page ››