Security Bulletin
25 Mar 2026
Biztonsági szemle
Ex-NSA Directors Discuss 'Red Line' for Offensive Cyberattacks
Four former NSA chiefs representing a near-complete history of US Cyber Command debated and discussed the role of offensive cyber in the government.
25 Mar 2026
Biztonsági szemle
CVE-2026-3608: Stack overflow in Kea daemons
CVE: CVE-2026-3608 Title: Stack overflow in Kea daemons Document version: 2.0 Posting date: 25 March 2026 Program impacted: Kea Versions affected: Kea 2.6.0 -> 2.6.4 3.0.0 -> 3.0.2 Severity: High Exploitable: Remotely Description: Sending a...
25 Mar 2026
Biztonsági szemle
Iran Hacktivists Make Noise but Have Little Impact on War
Iran-aligned groups are trying to make their mark in the Gulf, but the results have fallen short of remarkable.
25 Mar 2026
Biztonsági szemle
Fine-Tuning Embedding Models for Enterprise Retrieval: A Practical Guide with NVIDIA Nemotron Recipe
Cisco IT recently evaluated fine-tuning embedding models using NVIDIA Nemotron RAG fine-tuning recipe as part of an effort to improve retrieval accuracy for domain-specific enterprise data. The… Read more on Cisco Blogs
24 Mar 2026
Biztonsági szemle
CSA Launches CSAI Foundation for AI Security
The Cloud Security Alliance creates a dedicated nonprofit to govern autonomous AI agent ecosystems through risk intelligence and certification.
24 Mar 2026
Biztonsági szemle
Checkmarx KICS Code Scanner Targeted in Widening Supply Chain Hit
TeamPCP is the likely cyber threat actor behind attacks on Trivy, Checkmarx's KICS and VS Code plug-ins, and the LiteLLM AI library — and all signs point to more attacks to come.
24 Mar 2026
Biztonsági szemle
How AI Coding Tools Crushed the Endpoint Security Fortress
Security vendors have spent years building up defenses around the endpoint, but one researcher says AI coding tools have brought the walls down.
24 Mar 2026
Biztonsági szemle
E-Rate Application Window Closing Soon: Secure Your Funding Before April 1, 2026
With April 1, 2026, approaching, schools and libraries are reminded that the E-Rate funding window will soon close. The E-Rate program, designed to make telecommunications and internet access affordable for educational institutions, has been...
24 Mar 2026
Biztonsági szemle
A Developer’s First 10 Minutes: Secure a LangChain Agent with Cisco AI Defense
LangChain makes it easy to move from a working prototype to a useful agent in very little time. That is exactly why it has become such a common starting point for enterprise agent development. Agents don’t just generate text. They call tools...
24 Mar 2026
Biztonsági szemle
GitHub 'OpenClaw Deployer' Repo Delivers Trojan Instead
An AI-assisted campaign is spreading more than 300 poisoned packages for diverse assets ranging from developer tools to game cheats.
24 Mar 2026
Biztonsági szemle
How a Large Bank Uses AI Digital Twins for Threat Hunting
JPMorgan Chase uses digital fingerprints and digital twins to spot online attackers and malicious behaviors while also reducing pesky false alerts.
24 Mar 2026
Biztonsági szemle
Microsoft Proposes Better Identity, Guardrails for AI Agents
Companies need better controls to manage key threats rising from the growth of agentic AI. These new features provide a starting point.
Pagination
- Previous page ‹‹
- Page 36
- Next page ››