Security Bulletin
23 Feb 2026
Biztonsági szemle
Enigma Cipher Device Still Holds Secrets for Cyber Pros
The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyber threats.
23 Feb 2026
Biztonsági szemle
600+ FortiGate Devices Hacked by AI-Armed Amateur
A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
23 Feb 2026
Biztonsági szemle
New Partner Enablement Capabilities: Accelerating Your Path to Success
Discover the five new Cisco partner enablement capabilities now live. From AI-powered assistants and curated learning journeys to enhanced demo tools and shared quarterly development focus, learn how these resources help partners accelerate growth...
23 Feb 2026
Biztonsági szemle
Extending Infrastructure Fabric: The Journey to Cloud-Native Isovalent Networking
Cisco's acquisition of Isovalent extends unified networking from the data center to cloud-native environments. See how Cisco Nexus One with Isovalent delivers the deterministic performance for modern workloads and AI applications.
23 Feb 2026
Biztonsági szemle
Powering the AI-Driven Last Mile for MSOs: Assured Performance with Cisco Routed PON
AI is reshaping broadband demand and MSOs are feeling the pressure at the network edge. Cisco Routed PON meets the moment by combining the simplicity of PON with the intelligence of routing, integrating Layer 3 capabilities into the access network...
20 Feb 2026
Biztonsági szemle
Attackers Use New Tool to Scan for React2Shell Exposure
Researchers say threat actors wielded the sophisticated — and unfortunately named — toolkit to target high-value networks for React2Shell exploitation.
20 Feb 2026
Biztonsági szemle
'God-Like' Attack Machines: AI Agents Ignore Security Policies
Microsoft Copilot recently summarized and leaked user emails; but any AI agent will go above and beyond to complete assigned tasks, even breaking through their carefully designed guardrails.
20 Feb 2026
Biztonsági szemle
Lessons From AI Hacking: Every Model, Every Layer Is Risky
After two years of finding flaws in AI infrastructure, two Wiz researchers advise security pros to worry less about prompt injection and more about vulnerabilities.
20 Feb 2026
Biztonsági szemle
Managing Industrial Security at Scale: Introducing Cyber Vision Site Manager and Splunk App
Automate multi-site OT security management and gain unified visibility across all industrial sites with Cyber Vision Site Manager and the new Splunk app.
20 Feb 2026
Biztonsági szemle
Converged north-south networks: the critical path for AI success
North-south traffic is becoming a gating factor for AI performance—moving data in and results out fast enough to keep GPUs highly utilized. See how a converged Ethernet fabric with traffic-aware load balancing and centralized operations can help your...
20 Feb 2026
Biztonsági szemle
Unlocking the Future: How Cisco Networking App Marketplace Partners Enable Scalable AI-Ready Devices for Your Customers
Cisco Networking App Marketplace partners enable scalable, AI-ready devices by enhancing automation, security, and performance, empowering customers to modernize networks and unlock new business value across campus and branch environments.
20 Feb 2026
Biztonsági szemle
Latin America's Cyber Maturity Lags Threat Landscape
The slower pace of upgrades has the unintended impact of creating a haven for attackers, especially for initial access brokers and ransomware gangs.
Pagination
- Previous page ‹‹
- Page 52
- Next page ››