Security Bulletin
8 Sep 2025
Biztonsági szemle
Cisco Comply-to-Connect (C2C) Training Now Supports Third-Party Integrations
Updated Cisco Comply-to-Connect (C2C) training addresses challenges in deploying C2C solutions in mixed vendor environments.
8 Sep 2025
Biztonsági szemle
'MostereRAT' Malware Blends In, Blocks Security Tools
A threat actor is using a sophisticated EDR-killing malware tool in a campaign to maintain long-term, persistent access on Windows systems.
8 Sep 2025
Biztonsági szemle
Salesloft Breached via GitHub Account Compromise
The breach kickstarted a massive supply chain attack that led to the compromise of hundreds of Salesforce instances through stolen OAuth tokens.
8 Sep 2025
Biztonsági szemle
AI-Powered APIs and API-Enabled AI: A Symbiotic Evolution Driving Mutual Innovation
In today’s digital landscape, APIs are the foundational building blocks of innovation. They connect services, share data, and enable new experiences. But as our API ecosystems grow to include thousands of endpoints, they present a new set of...
8 Sep 2025
Biztonsági szemle
Tech Unscripted: Your Front-Row Seat for Honest Talk Between CIOs
Discover authentic conversations in Tech Unscripted Enterprise IT Customer Story Videos for insights into tackling IT challenges faced today.
8 Sep 2025
Biztonsági szemle
Launching the 2nd Edition of the Cisco Cybersecurity Academy in Portugal
After the tremendous success of our first edition, Cisco is excited to announce the return of the Cisco Cybersecurity Academy in Portugal. Now bigger, bolder, and more inclusive than ever.
8 Sep 2025
Biztonsági szemle
Transforming Infrastructure for the AI Era
Discover how Cisco helps hyperscale, neocloud, service provider, and enterprise customers evolve their networks for AI with high-performing pluggable optics for AI data centers and by connecting data centers with coherent pluggable optics that...
8 Sep 2025
Biztonsági szemle
The Critical Failure in Vulnerability Management
Organizations are seeking assistance to fix critical vulnerabilities. Solutions that orchestrate and automate network device protection put us on the right path.
8 Sep 2025
Biztonsági szemle
Security Fused into the Network to Protect OT at Scale
Learn how Cisco's integrated approach, embedding OT asset visibility and secure remote access into industrial switches, eliminates security blind spots, reduces TCO, and fosters IT and OT collaboration.
8 Sep 2025
Biztonsági szemle
HTTP Request Signatures, (Mon, Sep 8th)
This weekend, I noticed three related headers being used in requests to some of our honeypots for the first time [1]:
8 Sep 2025
Biztonsági szemle
IPv6 in 2025 – The Freedom of Address Space
Discover how embracing IPv6’s vast address space can simplify your network design and unlock new possibilities—plus, learn how Cisco is supporting customers on their journey to an IPv6-powered future.
8 Sep 2025
Biztonsági szemle
Zero Trust in the Era of Agentic AI
AI agents use the same networking infrastructure as users and apps. So security solutions like zero trust should evolve to protect agentic AI communications.
Pagination
- Previous page ‹‹
- Page 40
- Next page ››