Security Bulletin
26 Nov 2025
Biztonsági szemle
Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)
More than half of organizations surveyed aren't sure they can secure non-human identities (NHIs), underscoring the lag between the rollout of these identities and the tools to protect them.
26 Nov 2025
Biztonsági szemle
A Once-in-a-Generation Tribal Funding Moment—And How Cisco Should Show Up
Discover how historic federal investments and trusted partnerships are empowering Tribal Nations to bridge the digital divide, build digital sovereignty, and drive economic empowerment.
26 Nov 2025
Biztonsági szemle
Iran Exploits Cyber Domain to Aid Kinetic Strikes
The country deploys "cyber-enabled kinetic targeting" prior to — and following — real-world missile attacks against ships and land-based targets.
26 Nov 2025
Biztonsági szemle
ISC Stormcast For Wednesday, November 26th, 2025 https://isc.sans.edu/podcastdetail/9716, (Wed, Nov 26th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
25 Nov 2025
Biztonsági szemle
Advanced Security Isn't Stopping Ancient Phishing Tactics
New research reveals that sophisticated phishing attacks consistently bypass traditional enterprise security measures.
25 Nov 2025
Biztonsági szemle
Cheap Hardware Module Bypasses AMD, Intel Memory Encryption
Researchers built an inexpensive device that circumvents chipmakers' confidential computing protections and reveals weaknesses in scalable memory encryption.
25 Nov 2025
Biztonsági szemle
DPRK's FlexibleFerret Tightens macOS Grip
The actor behind the "Contagious Interview" campaign is continuing to refine its tactics and social engineering scams to wrest credentials from macOS users.
25 Nov 2025
Biztonsági szemle
With Friends Like These: China Spies on Russian IT Orgs
State-linked hackers stayed under the radar by using a variety of commercial cloud services for command-and-control communications.
25 Nov 2025
Biztonsági szemle
DNSSEC signed zones - best practice guidance relating to NSEC3 signing and validation
Overview DNSSEC-signed zones offer protection against response spoofing to both DNSSEC-validating resolvers and authoritative DNS zone operators who choose to sign their published zones. NSEC and NSEC3 are the mechanisms within DNSSEC used to provide...
25 Nov 2025
Biztonsági szemle
As Gen Z Enters Cybersecurity, Jury Is Out on AI's Impact
Despite possibly supplanting some young analysts, one Gen Z cybersecurity specialist sees AI helping teach those willing to learn and removing drudge work.
25 Nov 2025
Biztonsági szemle
A Note About Kea Release Notes
Previously, we provided full text copies of the release notes for each version of Kea here in our KB. However, since they are always available directly from our downloads site at https://downloads.isc.org/isc/kea/ and Read the Docs, we felt it would...
25 Nov 2025
Biztonsági szemle
'JackFix' Attack Circumvents ClickFix Mitigations
A new ClickFix variant ratchets up the psychological pressure to 100 and addresses some technical mitigations to classic ClickFix attacks.
Pagination
- Previous page ‹‹
- Page 55
- Next page ››