Security Bulletin
1 Oct 2025
Biztonsági szemle
Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General
Learn about the Microsoft SharePoint vulnerability and which steps you can take to mitigate the effects of this — and other — vulnerabilities.
1 Oct 2025
Biztonsági szemle
Connected Intelligence: Building the workplace of today for the workforce of tomorrow
Today, as artificial intelligence reshapes our world, the fabric of how we work—and who we work and connect with—is changing in ways we have only ever imagined. Tomorrow’s workplaces will look dramatically different—not just because of new...
1 Oct 2025
Biztonsági szemle
How Cisco IT streamlined network operations with Cisco Catalyst Center and Splunk
Discover how Cisco IT uses Catalyst Center automation and AI to streamline network operations and cut code vulnerabilities by 97%, slash upgrade times by 59%, and reduce MTTR and MTTD.
1 Oct 2025
Biztonsági szemle
ISC Stormcast For Wednesday, October 1st, 2025 https://isc.sans.edu/podcastdetail/9636, (Wed, Oct 1st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
1 Oct 2025
Biztonsági szemle
China Imposes One-Hour Reporting Rule for Major Cyber Incidents
The sweeping new regulations show that China's serious about hardening its own networks after launching widespread attacks on global networks.
1 Oct 2025
Biztonsági szemle
[Guest Diary] Comparing Honeypot Passwords with HIBP, (Wed, Oct 1st)
[This is a Guest Diary by Draden Barwick, an ISC intern as part of the SANS.edu Bachelor's Degree in Applied Cybersecurity (BACS) program [1].]
1 Oct 2025
Biztonsági szemle
From Workloads to Factories: Rethinking the Data Center for AI
How Cisco is delivering an industrial-scale engine for competitive advantage with the Cisco Secure AI Factory with NVIDIA.
30 Sep 2025
Biztonsági szemle
New China APT Strikes With Precision and Persistence
Phantom Taurus demonstrates a deep understanding of Windows environments, including advanced components like IIServerCore, a fileless backdoor that executes in memory to evade detection.
30 Sep 2025
Biztonsági szemle
'Klopatra' Trojan Makes Bank Transfers While You Sleep
A sophisticated new banking malware is hard to detect, capable of stealing lots of money, and infecting thousands of people in Italy and Spain.
30 Sep 2025
Biztonsági szemle
China Exploited New VMware Bug for Nearly a Year
A seemingly benign privilege-escalation process in VMware and other software has likely benefited attackers and other malware strains for years, researchers noted.
30 Sep 2025
Biztonsági szemle
WebexOne 2025: Unlocking the Power of Connected Intelligence
Today at WebexOne in San Diego, you will see an incredible convergence of vision, innovation, and community. This event is not just a showcase—it’s a testament to how Cisco is reimagining the future of work and building solutions for the AI era.
30 Sep 2025
Biztonsági szemle
"user=admin". Sometimes you don't even need to log in., (Tue, Sep 30th)
One of the common infosec jokes is that sometimes, you do not need to "break" an application, but you have to log in. This is often the case for weak default passwords, which are common in IoT devices. However, an even easier method is to tell the...
Pagination
- Previous page ‹‹
- Page 24
- Next page ››