Security Bulletin
![](/sites/default/files/styles/narrow_1x/public/feeds/3e/strategy-Chin_Leong_Teoh-Alamy.jpg.webp?itok=yd0QQQVv)
26 Apr 2024
Biztonsági szemle
CISO Corner: Evil SBOMs; Zero-Trust Pioneer Slams Cloud Security; MITRE's Ivanti Issue
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: security license mandates; a move to four-day remediation requirements; lessons on OWASP for LLMs...
![<p>(Adobe Stock)</p>](/sites/default/files/styles/narrow_1x/public/feeds/1e/020924_cyberattack.jpg.webp?itok=Oe-st0ps)
26 Apr 2024
Biztonsági szemle
Impact of organizational structure on ransomware outcomes: Where does your org fit in?
Organizational models faced challenges in core security operations like threat detection and remediation, indicating a potential need for additional expertise regardless of structure.
![Kaiser Permanente medical care facility.](/sites/default/files/styles/narrow_1x/public/feeds/0c/0426_kaiser_permanente.jpg.webp?itok=E72TJ4AF)
26 Apr 2024
Biztonsági szemle
Kaiser Permanente notifies 13.4M patients of potential data exposure
Patient data may have been transferred via apps to third-party vendors like Google, Microsoft and X.
![](/sites/default/files/styles/narrow_1x/public/feeds/77/Eco-Data-Center-featured-scaled.jpeg.webp?itok=hC5ts1mg)
26 Apr 2024
Biztonsági szemle
Experience Eco-Friendly Data Center Efficiency with Cisco’s Unified Computing System (UCS)
Learn how Cisco's Unified Computing System (UCS) helps you stand at the forefront of data center energy-saving with attributes and design innovations essential for fostering sustainable development and maximizing operational efficiency and...
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12591″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/3d/SWN_381_8e96df22-0c76-4487-88e6-66a22a04f41f.jpg.webp?itok=nI_YDBJ3)
26 Apr 2024
Biztonsági szemle
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
![](/sites/default/files/styles/narrow_1x/public/feeds/12/230130_Broadband_Subscriber_Blog_Feature.png.webp?itok=CW_rohWX)
26 Apr 2024
Biztonsági szemle
Evolving Broadband Networks with Cisco Subscriber Edge
Bridging the digital divide requires scalable infrastructure to deliver affordable services for everyone. Our Cisco Subscriber Edge solution simplifies the broadband network architecture with a distributed data plane and cloud-native control plane to...
![](/sites/default/files/styles/narrow_1x/public/feeds/6c/ArtemisDiana-software-components-shutterstock.jpg.webp?itok=bmNV_ViF)
26 Apr 2024
Biztonsági szemle
Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
Attackers will likely use software bills-of-material (SBOMs) for searching for software potentially vulnerable to specific software flaws.
![AI(Artificial intelligence) concept.](/sites/default/files/styles/narrow_1x/public/feeds/4b/1127_artificial_intelligence.jpg.webp?itok=xkoMkSHL)
26 Apr 2024
Biztonsági szemle
AI sparks increasing cyber concerns for execs amid growing adoption
Twenty percent of cybersecurity officers across the UK cited artificial intelligence as their organizations' most significant cybersecurity threat, according to TechRadar.
![](/sites/default/files/styles/narrow_1x/public/feeds/71/CISA-alert.jpg.webp?itok=oMES1Va5)
26 Apr 2024
Biztonsági szemle
Updated CISA exploited vulnerabilties catalog includes Windows print spooler bug
Attacks by Russian threat operation APT28, also known as Fancy Bear, Strontium, and Forest Blizzard, using the GooseEgg malware to exploit the Windows print spooler flaw, tracked as CVE-2022-38028, have prompted the security issue's inclusion to the...
![](/sites/default/files/styles/narrow_1x/public/feeds/b4/Risk_Emre_Akkoyun_Alamy.jpg.webp?itok=J-zl9bX9)
26 Apr 2024
Biztonsági szemle
Minimum Viable Compliance: What You Should Care About and Why
Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.
![Water drop](/sites/default/files/styles/narrow_1x/public/feeds/62/041524_water_drop.jpg.webp?itok=2u6W6g4Z)
26 Apr 2024
Biztonsági szemle
More details on rural water system breach sought by legislators
U.S. Department of Homeland Security Secretary Alejandro Mayorkas has been urged by Reps. Ruben Gallego, D-Ariz., and Pat Fallon, R-Texas, to provide more information regarding the January cyberattack against a water treatment plant in Muleshoe...
![](/sites/default/files/styles/narrow_1x/public/feeds/37/tank-Yuriy_Tuchkov-Alamy.jpg.webp?itok=-3LIP05t)
26 Apr 2024
Biztonsági szemle
Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack
The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.
Pagination
- Previous page ‹‹
- Page 194
- Next page ››