Security Bulletin

14 Aug 2025
Biztonsági szemle
Downgrade Attack Allows Phishing Kits to Bypass FIDO
You probably can't break FIDO authentication. Still, researchers have shown that there are ways to get around it.

14 Aug 2025
Biztonsági szemle
State and Local Leaders Lobby Congress for Cybersecurity Resources
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organizations without access to basic cybersecurity resources they need to protect US national security, a...

14 Aug 2025
Biztonsági szemle
Agentic AI Use Cases for Security Soar, but Risks Demand Close Attention
Organizations increasingly use agents to automate mundane tasks and address an overwhelming amount of sensitive data. However, adoption requires strict security strategies that keep humans in the loop for now.

14 Aug 2025
Biztonsági szemle
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
In this Dark Reading News Desk interview, Google's Mark Berschadski highlights the critical role browsers play in today's work environment and how Chrome Enterprise is evolving to meet modern security challenges while enabling productivity.

14 Aug 2025
Biztonsági szemle
Police & Government Email Access for Sale on Dark Web
Cybercriminals are auctioning off live email credentials, giving other criminals access to sensitive systems, confidential intelligence, and, potentially, a higher success rate than ever.

14 Aug 2025
Biztonsági szemle
NIST Digital Identity Guidelines Evolve With Threat Landscape
The US National Institute of Standards and Technology updated its Digital Identity Guidelines to match current threats. The document detailed technical recommendations as well as suggestions for organizations.

14 Aug 2025
Biztonsági szemle
CISA Warns N-able Bugs Under Attack, Patch Now
Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn't be seen at the beginning of an exploit chain.

14 Aug 2025
Biztonsági szemle
Cybersecurity Spending Slows & Security Teams Shrink
Security budgets are lowest in healthcare, professional and business services, retail, and hospitality, but budget growth remained above 5% in financial services, insurance, and tech.

14 Aug 2025
Biztonsági szemle
Google Chrome Enterprise: Extend Protections From Browser to OS
Dark Reading's Terry Sweeney and Google's Loren Hudziak discuss how the humble web browser has transformed from a simple web access tool into a common conduit through which a lot of business is done.

14 Aug 2025
Biztonsági szemle
Secure and Modernize your Roadways with Cisco
Modernize roadways with Cisco’s secure networking for ITS. Boost safety, efficiency, and real-time data. See our solutions at ITS World Congress 2025, Booth #1741

14 Aug 2025
Biztonsági szemle
Making SD-WAN Smarter with MCP: A Developer’s Guide
Discover how Model Context Protocol (MCP) simplifies SD-WAN development by enabling AI to communicate with network infrastructure using natural language, replacing complex vendor-specific APIs.

14 Aug 2025
Biztonsági szemle
Navigating the Cybersecurity Budget Tug-of-War
Companies ready to move beyond reactive defense and toward full-spectrum protection need to invest in strategies that rally around resiliency, unified cybersecurity, and data protection.
Pagination
- Previous page ‹‹
- Page 20
- Next page ››