Security Bulletin

2 Apr 2025
Biztonsági szemle
IT leaders sound alarm on centralized security risks
A survey by Naoris Protocol highlights growing concerns among IT leaders over cybersecurity vulnerabilities, indicating that a shift may be needed toward decentralized infrastructure for resilience and security, ComputerWeekly reports.

2 Apr 2025
Biztonsági szemle
Over half of web traffic is bot-generated, report says
More than half of all web content requests now come from bots, with AI-driven automation fueling a surge in traffic, according to a report by SiliconAngle.

2 Apr 2025
Biztonsági szemle
Cyber threats against software supply chain fueled by AI
SiliconAngle reports that growing artificial intelligence adoption across the software supply chain has prompted significantly more cybersecurity threats, which were mostly Common Vulnerabilities and Exposures, malicious packages, exposed secrets...

2 Apr 2025
Biztonsági szemle
Renewal of state, local cyber grant program sought
House Subcommittee on Cybersecurity and Infrastructure Protection lawmakers have been urged to ratify State and Local Cybersecurity Grant Program funding amid the threat of cutbacks as its efficacy is being doubted by Department of Homeland Security...

2 Apr 2025
Biztonsági szemle
Medical device cybersecurity to be adversely impacted by HHS layoffs
Significant layoffs at the Department of Health and Human Services were regarded by lawmakers and cybersecurity experts to be ultimately detrimental to the safety and security of medical devices, reports The Record, a news site by cybersecurity firm...

2 Apr 2025
Biztonsági szemle
From waste to wonders: My sustainability journey with Cisco’s Green Team
Aaditya, a Cisco employee and Green Team Network Bengaluru leader, shares more about his sustainability journey.

2 Apr 2025
Biztonsági szemle
Unlocking the Privacy Advantage to Build Trust in the Age of AI
The Cisco 2025 Data Privacy Benchmark Study offers insights into the evolving privacy landscape and privacy’s critical role in an AI-centric world.

2 Apr 2025
Biztonsági szemle
ISC Stormcast For Wednesday, April 2nd, 2025 https://isc.sans.edu/podcastdetail/9390, (Wed, Apr 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2 Apr 2025
Biztonsági szemle
Malaysian Airport's Cyber Disruption a Warning for Asia
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack.

2 Apr 2025
Biztonsági szemle
Google Brings End-to-End Encryption to Gmail
The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail.

1 Apr 2025
Biztonsági szemle
Visibility, Monitoring Key to Enterprise Endpoint Strategy
A successful enterprise security defense requires a successful endpoint security effort. With options ranging from EDR, SIEM, SOAR, and more, how do security teams cut through the clutter and focus on what matters?

1 Apr 2025
Biztonsági szemle
Schrodinger, Lucid, Crocodilus, Wordpress, Ivanti, Oracle, Android, Josh Marpet... - SWN #464
Pagination
- Previous page ‹‹
- Page 30
- Next page ››