Security Bulletin

30 Jan 2025
Biztonsági szemle
Leading the charge in industrial and outdoor wireless LAN infrastructure
Elevating Wi-Fi for ultra-reliability and seamless handoffs to support your deployment scenarios and diverse applications.

30 Jan 2025
Biztonsági szemle
Automated Pen Testing Is Improving — Slowly
The rate of evolution has been glacial, but tools now understand cloud environments and can target Web applications.

30 Jan 2025
Biztonsági szemle
Industry groups push for federal data privacy legislation
In a letter sent to Congressional leaders, the organizations argued that a national privacy standard would benefit businesses by reducing regulatory complexity and promoting competition, which could lower costs and increase consumer access.

30 Jan 2025
Biztonsági szemle
Tenable to acquire Vulcan Cyber for $150M
The deal comprises $147 million in cash and $3 million in restricted stock units and is expected to close by the end of March.

30 Jan 2025
Biztonsági szemle
Zyxel zero-day flaw actively being exploited
Cybersecurity researchers at GreyNoise warned that threat intelligence data indicates attack attempts originating from dozens of IP addresses, primarily from Taiwan, with over 1,500 vulnerable devices detected online.

30 Jan 2025
Biztonsági szemle
DogWifTools breached in supply-chain attack on cryptocurrency wallets
The attackers were able to access the project's private GitHub repository by reverse engineering the software and extracting a GitHub token.

30 Jan 2025
Biztonsági szemle
Customer Experience is set to Go Beyond at Cisco Live Amsterdam
See what's on tap from the Customer Experience (CX) team at Cisco Live Amsterdam 2025.

30 Jan 2025
Biztonsági szemle
DeepSeek AI platform exposed user data through unsecured database
Researchers from cloud security firm Wiz discovered the issue and attempted to contact DeepSeek through multiple channels.

30 Jan 2025
Biztonsági szemle
Lazarus Group found using web-based admin panel for campaign management
Based on reporting from SecurityScorecard's STRIKE team, the North Korean state-backed threat actor employs a React and Node.js-based system in each C2 server to enable centralized management of stolen data, observation of compromised hosts, and...

30 Jan 2025
Biztonsági szemle
Exposure Management Provider CYE Acquires Solvo
The addition of Solvo CSPM to CYE Hyver aims to address need for multicloud vulnerability monitoring and risk assessment.

30 Jan 2025
Biztonsági szemle
2025: Connecting Everything with Cisco’s Mobility Services Platform
By partnering with Cisco and harnessing the power of our Mobility Services Platform, CSPs elevate their connectivity to deliver end-to-end enterprise value and use cases that solve real-world business problems.

30 Jan 2025
Biztonsági szemle
Top Threat Tactics and How to Address Them
See the key takeaways for the most recent Cisco Talos Incident Response report and learn how you can use Cisco Security products to help defend against these.
Pagination
- Previous page ‹‹
- Page 309
- Next page ››