Security Bulletin
4 Feb 2026
Biztonsági szemle
Developer’s Guide to Cisco Live EMEA 2026: AI, Automation, and Meraki
Join Us at Cisco Live EMEA 2026 February 9–13, 2026 Cisco Live EMEA 2026 is shaping up to be one of the most developer- and automation-focused events yet, bringing together engineers, developers, architects, and IT leaders for a week of hands-on...
4 Feb 2026
Biztonsági szemle
Striving for Sustainability: Meet Mike King
Mike King shares how sustainability is evolving into a space where science, practical business decisions, and environmental impact intersect.
4 Feb 2026
Biztonsági szemle
NetSecOPEN Validates Cisco 8375 Secure Routers: Security and Performance for the Branch
Independent testing by NetSecOPEN shows enterprises no longer need to choose between security and performance at the branch. See how Cisco C8375-E-G2 Secure Routers unify advanced routing and integrated next-generation firewall to redefine branch...
4 Feb 2026
Biztonsági szemle
Extra Extra! Announcing DR Global Latin America
Dark Reading has something new hitting the newsstand: a content section purpose-built for Latin American readers, featuring news, analysis, features, and multimedia.
4 Feb 2026
Biztonsági szemle
Big Breach or Smooth Sailing? Mexican Gov't Faces Leak Allegations
A hacktivist group claims a 2.3-terabyte data breach exposes the information of 36 million Mexicans, but no sensitive accounts are at risk, says government.
4 Feb 2026
Biztonsági szemle
Google Looker Bugs Allow Cross-Tenant RCE, Data Exfil
Attackers could even have used one vulnerable Lookout user to gain access to other GCP tenants' environments.
4 Feb 2026
Biztonsági szemle
Analytics Context Engineering for LLM
This blog was written in collaboration with Fan Bu, Jason Mackay, Borya Sobolev, Dev Khanolkar, Ali Dabir, Puneet Kamal, Li Zhang, and Lei Jin. “Everything is a file”; some are databases Introduction… Read more on Cisco Blogs
3 Feb 2026
Biztonsági szemle
Top 5 Takeaways to Find Yourself in the Future of Data Science
If you’ve ever thought that a career in data science was out of your reach or "too technical," you’ll definitely want to watch this session.
3 Feb 2026
Biztonsági szemle
Russian Hackers Weaponize Microsoft Office Bug in Just 3 Days
APT28's attacks rely on specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
3 Feb 2026
Biztonsági szemle
GlassWorm Malware Returns to Shatter Developer Ecosystems
The self-replicating malware has poisoned a fresh set of Open VSX software components, leaving potential downstream victims with infostealer infections.
3 Feb 2026
Biztonsági szemle
AI May Supplant Pen Testers, But Oversight & Trust Are Not There Yet
Crowdsourced bug bounties and pen-testing firms see AI agents stealing the low-hanging vulnerabilities from their human counterparts. Oversight remains key.
3 Feb 2026
Biztonsági szemle
8-Minute Access: AI Accelerates Breach of AWS Environment
The AI-assisted attack, which started with exposed credentials from public S3 buckets, rapidly achieved administrative privilges.
Pagination
- Previous page ‹‹
- Page 20
- Next page ››