Security Bulletin
2 Apr 2025
Biztonsági szemle
Unlocking the Privacy Advantage to Build Trust in the Age of AI
The Cisco 2025 Data Privacy Benchmark Study offers insights into the evolving privacy landscape and privacy’s critical role in an AI-centric world.
2 Apr 2025
Biztonsági szemle
ISC Stormcast For Wednesday, April 2nd, 2025 https://isc.sans.edu/podcastdetail/9390, (Wed, Apr 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2 Apr 2025
Biztonsági szemle
Malaysian Airport's Cyber Disruption a Warning for Asia
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack.
2 Apr 2025
Biztonsági szemle
Google Brings End-to-End Encryption to Gmail
The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail.
1 Apr 2025
Biztonsági szemle
Visibility, Monitoring Key to Enterprise Endpoint Strategy
A successful enterprise security defense requires a successful endpoint security effort. With options ranging from EDR, SIEM, SOAR, and more, how do security teams cut through the clutter and focus on what matters?
1 Apr 2025
Biztonsági szemle
Schrodinger, Lucid, Crocodilus, Wordpress, Ivanti, Oracle, Android, Josh Marpet... - SWN #464
1 Apr 2025
Biztonsági szemle
Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks
Over the past few weeks, bad actors from different regions have been scanning devices with the VPN for potential vulnerabilities.
1 Apr 2025
Biztonsági szemle
As CISA Downsizes, Where Can Enterprises Get Support?
In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services.
1 Apr 2025
Biztonsági szemle
24,000 unique IP addresses target PAN-OS GlobalProtect gateways
Attackers aim to find zero-days in the PAN-OS gateways they can exploit.
1 Apr 2025
Biztonsági szemle
Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
The bill will allow Japan to implement safeguards and strategies that have been in use by other countries for some time.
1 Apr 2025
Biztonsági szemle
Check Point Disputes Hacker's Breach Claims
The security vendor counters that none of the information came directly from its systems but rather was acquired over a period of time by targeting individuals.
1 Apr 2025
Biztonsági szemle
Identiverse 2025: Your map to navigate the future of identity security
As identity threats surge and regulations tighten, Identiverse 2025 brings the digital identity security community together to decode what’s next—and who’s leading the charge.
Pagination
- Previous page ‹‹
- Page 253
- Next page ››