Security Bulletin

15 Jul 2025
Biztonsági szemle
5 Ways Wi-Fi 7 Elevates the Guest Experience with Smart Hospitality
Discover how Wi-Fi 7 revolutionizes hospitality with seamless, high-speed connectivity, powering smart devices and enhancing guest experiences with Cisco solutions.

15 Jul 2025
Biztonsági szemle
Public Sector Highlights: Key Takeaways and Success Stories from Cisco Live US 2025
Explore how public sector organizations are accelerating innovation, security, and sustainability with the top three takeaways from Cisco Live US 2025.

15 Jul 2025
Biztonsági szemle
How Criminal Networks Exploit Insider Vulnerabilities
Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.

15 Jul 2025
Biztonsági szemle
MITRE Launches AADAPT Framework for Financial Systems
The new framework is modeled after and meant to complement the MITRE ATT&CK framework, and it is aimed at detecting and responding to cyberattacks on cryptocurrency assets and other financial targets.

15 Jul 2025
Biztonsági szemle
Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating
Combining the power of Duo's Identity Management and Cisco's Secure Access and Identity Intelligence protects against stolen credentials and phishing attacks.

15 Jul 2025
Biztonsági szemle
Keylogger Data Stored in an ADS, (Tue, Jul 15th)
If many malware samples try to be "filess" (read: they try to reduce their filesystem footprint to the bare minimum), another technique remains interesting: Alternate Data Streams or "ADS"[ 1]. This NTFS feature allows files to contain multiple data...

15 Jul 2025
Biztonsági szemle
ISC Stormcast For Tuesday, July 15th, 2025 https://isc.sans.edu/podcastdetail/9526, (Tue, Jul 15th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

14 Jul 2025
Biztonsági szemle
Web-Inject Campaign Debuts Fresh Interlock RAT Variant
A cyber-threat campaign is using legitimate websites to inject victims with remote access Trojans belonging to the Interlock ransomware group, in order to gain control of devices.

14 Jul 2025
Biztonsági szemle
Military Veterans May Be What Cybersecurity Is Looking For
As the field struggles with a shortage, programs that aim to provide veterans with the technical skills needed to succeed in cybersecurity may be the solution for everyone.

14 Jul 2025
Biztonsági szemle
Google Gemini AI Bug Allows Invisible, Malicious Prompts
A prompt-injection vulnerability in the AI assistant allows attackers to create messages that appear to be legitimate Google Security alerts but instead can be used to target users across various Google products with vishing and phishing.

14 Jul 2025
Biztonsági szemle
DShield Honeypot Log Volume Increase, (Mon, Jul 14th)
The volume of honeypot logs changes over time. Very rarely are honeypot logs quiet, meaning that there are no internet scans or malicious activity generating logs. Honeypots can see large increases in activity [1], but this has tended to be the...

14 Jul 2025
Biztonsági szemle
The Dark Side of Global Power Shifts & Demographic Decline
As global power realigns and economies falter, the rise in cybercrime is no longer hypothetical — it's inevitable.
Pagination
- Previous page ‹‹
- Page 44
- Next page ››