Security Bulletin
2 Jun 2025
Biztonsági szemle
Beyond the Broken Wall: Why the Security Perimeter Is Not Enough
Organizations need to abandon perimeter-based security for data-centric protection strategies in today's distributed IT environments.
2 Jun 2025
Biztonsági szemle
In the AI Race With China, Don't Forget About Security
The US needs to establish a clear framework to provide reasonable guardrails to protect its interests — the quicker, the better.
2 Jun 2025
Biztonsági szemle
Streamline Regulation Mandates With NIST CSF and Secure Workload
Cisco Secure Workload serves as a foundational solution for organizations seeking to implement an effective microsegmentation strategy.
2 Jun 2025
Biztonsági szemle
Redefining Infrastructure Strategy for a Fragmented, Hybrid Future
Flexibility, collaboration, and modularity are defining the next wave of enterprise IT Enterprise infrastructure strategy is entering a new phase—one where the goal is no longer just centralization or consolidation, but intelligent distribution. IT...
2 Jun 2025
Biztonsági szemle
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2021-32030 ASUS Routers Improper Authentication Vulnerability CVE-2023-39780 ASUS RT-AX55 Routers OS Command...
2 Jun 2025
Biztonsági szemle
ISC Stormcast For Monday, June 2nd, 2025 https://isc.sans.edu/podcastdetail/9474, (Mon, Jun 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2 Jun 2025
Biztonsági szemle
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Eyal Benishti, Chris Peluso, Chad Alessi, Tony Anscombe, Karl Van den Bergh, Nick Carroll - ESW #409
2 Jun 2025
Biztonsági szemle
Simple SSH Backdoor, (Mon, Jun 2nd)
For most system and network administrators, the free SSH client Putty has been their best friend for years! This tool was also (ab)used by attackers that deployed a trojanized version[ 1]. Microsoft had the good idea to include OpenSSH (beta version)...
1 Jun 2025
Biztonsági szemle
YARA 4.5.3 Release, (Sun, Jun 1st)
YARA 4.5.3 was released with 5 bugfixes.
31 May 2025
Biztonsági szemle
A PNG Image With an Embedded Gift, (Sat, May 31st)
While hunting, I found an interesting picture. It's a PNG file that was concatenated with two interesting payloads. There are file formats that are good candidates to have data added at the end of the file. PNG is the case because the file...
31 May 2025
Biztonsági szemle
Learn with Cisco at Cisco Live 2025 in San Diego
As a tech professional in today’s rapidly evolving digital landscape, you know the challenge: staying ahead of the curve while managing your daily responsibilities. The pace of innovation in AI,… Read more on Cisco Blogs
30 May 2025
Biztonsági szemle
Identiverse 2025: Community rallies around common threats and issues
The identity security community is set to descend onto Las Vegas for the annual Identiverse security conference.
Pagination
- Previous page ‹‹
- Page 145
- Next page ››