Security Bulletin
24 Jul 2025
Biztonsági szemle
Empowering Higher Education: Cisco’s Perspective on the CAUDIT Top Ten 2025 Technology Priorities
At Cisco, we believe that technology is the foundation of innovation, collaboration, and success in higher education and research. The release of the CAUDIT Top Ten 2025 report is a pivotal moment for institutions across Australasia and the South...
24 Jul 2025
Biztonsági szemle
Cisco Secure Firewall: First to earn SE Labs AAA in Advanced Performance
Cisco Secure Firewall 4225 is the first to get SE Labs AAA for Advanced Performance, proving top speed & protection.
24 Jul 2025
Biztonsági szemle
New Tool: ficheck.py, (Thu, Jul 24th)
As I mention every time I teach FOR577, I have been a big fan of file integrity monitoring tools (FIM) since Gene Kim first released Tripwire well over 30 years ago. I've used quite a few of them over the years including tripwire, OSSEC...
24 Jul 2025
Biztonsági szemle
ISC Stormcast For Thursday, July 24th, 2025 https://isc.sans.edu/podcastdetail/9540, (Thu, Jul 24th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
24 Jul 2025
Biztonsági szemle
Fixed Ivanti Bugs Still Haunt Japan Orgs 6 Months Later
Chinese threat actors have been feeding off the same Ivanti RCE vulnerabilities we've known about since last year, partly thanks to complications in patching.
23 Jul 2025
Biztonsági szemle
Banking Trojan Coyote Abuses Windows UI Automation
It's the first known instance of malware that abuses the UIA framework and has enabled dozens of attacks against banks and crypto exchanges in Brazil.
23 Jul 2025
Biztonsági szemle
Dark Web Hackers Moonlight as Travel Agents
Hackers are using stolen goods such as credit cards and loyalty points to book travel for sometimes unsuspecting clients, and remote workers, SMBs, travel brands, and others are at risk.
23 Jul 2025
Biztonsági szemle
Department of Education Site Mimicked in Phishing Scheme
An ongoing phishing campaign is using fake versions of the department's G5 grant portal, taking advantage of political turmoil associated with the DoE's 1,400 layoffs.
23 Jul 2025
Biztonsági szemle
What Makes Great Threat Intelligence?
Anyone can buy or collect data, but the goal must be to realize actionable insight relevant to the organization in question.
23 Jul 2025
Biztonsági szemle
Analyzing Sharepoint Exploits (CVE-2025-53770, CVE-2025-53771), (Wed, Jul 23rd)
A few days after the exploit originally became widely known, there are now many different SharePoint exploit attempts in circulation. We do see some scans by researchers to identify vulnerable systems (or to scan for common artifacts of compromise)...
23 Jul 2025
Biztonsági szemle
Crash Override Turns to ERM to Combat Visibility Challenges
The newly launched security startup provides an engineering relationship management platform that provides enterprises with visibility across code, infrastructure, and tools.
23 Jul 2025
Biztonsági szemle
Stop AI Bot Traffic: Protecting Your Organization's Website
As crawlers and bots bog down websites in the era of AI, some researchers say that the solution for the Internet's most vulnerable websites is already here.
Pagination
- Previous page ‹‹
- Page 74
- Next page ››