Security Bulletin

14 Aug 2025
Biztonsági szemle
Secure and Modernize your Roadways with Cisco
Modernize roadways with Cisco’s secure networking for ITS. Boost safety, efficiency, and real-time data. See our solutions at ITS World Congress 2025, Booth #1741

14 Aug 2025
Biztonsági szemle
Making SD-WAN Smarter with MCP: A Developer’s Guide
Discover how Model Context Protocol (MCP) simplifies SD-WAN development by enabling AI to communicate with network infrastructure using natural language, replacing complex vendor-specific APIs.

14 Aug 2025
Biztonsági szemle
Navigating the Cybersecurity Budget Tug-of-War
Companies ready to move beyond reactive defense and toward full-spectrum protection need to invest in strategies that rally around resiliency, unified cybersecurity, and data protection.

14 Aug 2025
Biztonsági szemle
Cisco named a Leader in IDC MarketScape Hybrid Firewall Vendor Assessment
Cisco has been recognized as a Leader in the IDC MarketScape: Worldwide Enterprise Hybrid Firewall 2025 Vendor Assessment.

14 Aug 2025
Biztonsági szemle
ISC Stormcast For Thursday, August 14th, 2025 https://isc.sans.edu/podcastdetail/9570, (Thu, Aug 14th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

14 Aug 2025
Biztonsági szemle
AI and Faster Attack Analysis [Guest Diary], (Wed, Aug 13th)
[This is a Guest Diary by Joseph Noa, an ISC intern as part of the SANS.edu BACS program]

14 Aug 2025
Biztonsági szemle
North Korea Attacks South Koreans With Ransomware
DPRK hackers are throwing every kind of malware at the wall and seeing what sticks, deploying stealers, backdoors, and ransomware all at once.

13 Aug 2025
Biztonsági szemle
Fortinet Products Are in the Crosshairs Again
The company disclosed a critical FortiSIEM flaw with a PoC exploit for it the same week researchers warned of an ominous surge in malicious traffic targeting the vendor's SSL VPNs.

13 Aug 2025
Biztonsági szemle
Whispers of XZ Utils Backdoor Live on in Old Docker Images
Developers maintaining the images made the "intentional choice" to leave the artifacts available as "a historical curiosity," given the improbability they'd be exploited.

13 Aug 2025
Biztonsági szemle
Popular AI Systems Still a Work-in-Progress for Security
According to a recent Forescout analysis, open source models were significantly less successful in vulnerability research than commercial and underground models.

13 Aug 2025
Biztonsági szemle
Patch Now: Attackers Target OT Networks via Critical RCE Flaw
Researchers observed exploitation attempts against a vulnerability with a CVSS score of 10 in a popular Erlang-based platform for critical infrastructure and OT development.

13 Aug 2025
Biztonsági szemle
What the LockBit 4.0 Leak Reveals About RaaS Groups
The leak serves as a wake-up call: Being prepared is the cornerstone of a successful defense, and those who don't prepare are going to face uncertainty caused by the lack of attackers' accountability.
Pagination
- Previous page ‹‹
- Page 21
- Next page ››