Security Bulletin
26 Feb 2026
Biztonsági szemle
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years
The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind.
26 Feb 2026
Biztonsági szemle
Making AI Prompts More Effective for SMBs
Stop getting "everything but the kitchen sink" from AI. Learn how to use the Role-Action-Context-Output framework to transform AI from a blunt instrument into a strategic partner for your small business.
26 Feb 2026
Biztonsági szemle
Upskilling in the AI Era | FY25 Purpose Report
Discover how Cisco is upskilling its employees in the AI era, as seen in our FY25 Purpose Report.
26 Feb 2026
Biztonsági szemle
Chinese Police Use ChatGPT to Smear Japan PM Takaichi
A Chinese keyboard warrior inadvertently leaked information about politically motivated influence operations through a ChatGPT account.
25 Feb 2026
Biztonsági szemle
Flaws in Claude Code Put Developers' Machines at Risk
The vulnerabilities highlight a big drawback to integrating AI into software development workflows and the potential impact on supply chains.
25 Feb 2026
Biztonsági szemle
RAMP Forum Seizure Fractures Ransomware Ecosystem
Researchers suggest defenders monitor how these malicious groups re-form and leverage the useful threat intel to guide their next moves.
25 Feb 2026
Biztonsági szemle
PCI Council Says Threats to Payments Systems Are Speeding Up
The PCI Security Standards Council experienced a record year in many regards, but its first annual report shows it needs to work even faster to stay ahead of attackers.
25 Feb 2026
Biztonsági szemle
Ice Dancing on the Factory Floor: SEW’s AGVs Glide with Cisco URWB
See how SEW USOCOME and NXO France use URWB for uninterrupted Automated Guided Vehicles (AGVs) connectivity with simplified deployment with Cisco Wireless with URWB.
25 Feb 2026
Biztonsági szemle
Malicious Next.js Repos Target Developers Via Fake Job Interviews
Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent access to infected machines.
25 Feb 2026
Biztonsági szemle
Germany’s Digital Health Revolution: Building a Smarter, More Connected Future for Care
Germany’s Transformation Fund is ushering in a new era of digital healthcare, with billion invested in modernizing hospitals and empowering care professionals. This blog explores how the country is shaping a smart connected healthcare future.
25 Feb 2026
Biztonsági szemle
Accelerating agent intelligence: Cisco Secure AI Factory expands with NVIDIA and VAST
A secure AI data platform combines VAST and Cisco UCS with Cilium, Tetragon, and Cisco AI Defense to accelerate RAG and agentic AI, while enforcing container-level segmentation, runtime visibility, and model/MCP security. Ship AI outcomes faster...
25 Feb 2026
Biztonsági szemle
Why 'Call This Number' TOAD Emails Beat Gateways
Attackers are bypassing email gateways through telephone-oriented attack delivery (TOAD), in which the only email payload is a phone number.
Pagination
- Previous page ‹‹
- Page 50
- Next page ››