Security Bulletin
13 Apr 2026
Biztonsági szemle
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
Security experts warn of an "AI vulnerability storm" triggered by the introduction of Anthropic's Claude Mythos in a new paper from the Cloud Security Alliance (CSA).
13 Apr 2026
Biztonsági szemle
Adobe Patches Actively Exploited Zero-Day That Lingered for Months
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four months.
13 Apr 2026
Biztonsági szemle
Empty Attestations: OT Lacks the Tools for Cryptographic Readiness
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
13 Apr 2026
Biztonsági szemle
Beyond the Chatbot: How Agentic Frameworks Change Network Engineering
Learn how agentic frameworks orchestrate end-to-end network engineering workflows using skills, MCP servers, and human approval gates.
13 Apr 2026
Biztonsági szemle
APT41 Delivers 'Zero-Detection' Backdoor to Harvest Cloud Credentials
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.
13 Apr 2026
Biztonsági szemle
How we’re building a cleaner, more efficient energy supply | FY25 Purpose Report
Cisco was able to achieve its ambitious Scope 1 and 2 GHG emissions reduction goal through a holistic approach across our global operations, from driving efficiency to sourcing renewable energy.
13 Apr 2026
Biztonsági szemle
Scans for EncystPHP Webshell, (Mon, Apr 13th)
Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more...
13 Apr 2026
Biztonsági szemle
Preparing for Post-Quantum Cryptography: The Secure Firewall Roadmap
Cisco Secure Firewall’s post-quantum cryptography roadmap: what’s available today, what’s coming, and how to start planning.
13 Apr 2026
Biztonsági szemle
ISC Stormcast For Monday, April 13th, 2026 https://isc.sans.edu/podcastdetail/9888, (Mon, Apr 13th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
10 Apr 2026
Biztonsági szemle
Hims Breach Exposes the Most Sensitive Kinds of PHI
Threat actors breached the telehealth brand, and now they may know who's bald, overweight, and impotent. What could they do with that information?
10 Apr 2026
Biztonsági szemle
Your Next Breach Will Look Like Business as Usual
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.
10 Apr 2026
Biztonsági szemle
Non-Obvious Patterns in Building Enterprise AI Assistants
Lessons from building production AI systems that nobody talks about. The conversation around AI agents has moved fast. A year ago, everyone was optimizing RAG pipelines. Now the discourse centers on context engineering, MCP/A2A protocols, agentic.
Pagination
- Previous page ‹‹
- Page 23
- Next page ››