Security Bulletin

24 Apr 2025
Biztonsági szemle
Why comprehensive scan coverage is critical for DevSecOps lifecycle success and regulatory compliance
Picking over code doesn’t guarantee problem-free software. Only automated scans that analyze first- and third-party code can provide the total visibility required to comply with the CRA and other new digital-security regulations.
24 Apr 2025
Biztonsági szemle
Vestel AC Charger
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Vestel Equipment: AC Charger Vulnerability: Exposure of Sensitive System Information to an Unauthorized Control Sphere 2. RISK EVALUATION...
24 Apr 2025
Biztonsági szemle
Johnson Controls Software House iSTAR Configuration Utility (ICU) Tool
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: iSTAR Configuration Utility (ICU) Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful...
24 Apr 2025
Biztonsági szemle
Schneider Electric Modicon Controllers
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum Vulnerabilities: Trust Boundary Violation...
24 Apr 2025
Biztonsági szemle
Nice Linear eMerge E3
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Nice Equipment: Linear eMerge E3 Vulnerability: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 2...

24 Apr 2025
Biztonsági szemle
Black Hat Asia 2025: Innovation in the SOC
Cisco is the Security Cloud Provider to the Black Hat conferences. Learn about the latest innovations for the SOC of the Future.
24 Apr 2025
Biztonsági szemle
ALBEDO Telecom Net.Time - PTP/NTP Clock
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: ALBEDO Telecom Equipment: Net.Time - PTP/NTP clock Vulnerability: Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of...
24 Apr 2025
Biztonsági szemle
CISA Releases Seven Industrial Control Systems Advisories
CISA released seven Industrial Control Systems (ICS) advisories on April 24, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-114-01 Schneider Electric Modicon...
24 Apr 2025
Biztonsági szemle
Planet Technology Network Products
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Planet Technology Equipment: Planet Technology Network Products Vulnerabilities: Improper Neutralization of Special Elements used in an OS...

24 Apr 2025
Biztonsági szemle
3 ways to build a ransomware IR strategy that works
Here’s where companies fail with ransomware response plans – and how to develop ones that work.

24 Apr 2025
Biztonsági szemle
Crisis Response Community volunteers know what it takes to stay connected
Cisco Crisis Response Community volunteers recently gathered to reflect on their training and talk about why they give their time and expertise.

24 Apr 2025
Biztonsági szemle
Five Empowering Tips for ICT Career Success
The path to a career in technology isn’t always easy, and I know this firsthand. I didn’t grow up dreaming of a tech career. I stepped into it out of necessity to support my family. My parents were cleaners, and by the time I was 13, I was helping...
Pagination
- Previous page ‹‹
- Page 31
- Next page ››