Security Bulletin
18 May 2024
Biztonsági szemle
Hardware cybersecurity leader, Flexxon, introduces Server Defender
Flexxon's Camellia Chan on advanced engineering at the hardware layer.
18 May 2024
Biztonsági szemle
Leveling the cybersecurity playing field
Blumira's Jim Simpson on how the company is lowering the barrier to entry in cybersecurity.
17 May 2024
Biztonsági szemle
CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: DR's podcast on the CISO & the SEC; breaking down CISA's Secure by Design Pledge; Singapore puts...
17 May 2024
Biztonsági szemle
CISOs Grapple With IBM's Unexpected Cybersecurity Software Exit
IBM's abrupt divestiture of QRadar SaaS underscores the consolidation of SIEM, XDR, and AI technologies into unified platforms.
17 May 2024
Biztonsági szemle
6K-plus AI models may be affected by critical RCE vulnerability
A flaw in the popular llama_cpp_python package could lead to supply chain attacks on LLMs.
17 May 2024
Biztonsági szemle
Zscaler annual phishing report finds a near 60% increase in phishing attacks in 2023
Zscaler's Deepen Desai discusses the nearly 60% increase in phishing attacks in 2023.
17 May 2024
Biztonsági szemle
Intel Discloses Max Severity Bug in Its AI Model Compression Software
The improper input validation issue in Intel Neural Compressor enables remote attackers to execute arbitrary code on affected systems.
17 May 2024
Biztonsági szemle
10 Ways a Digital Shield Protects Apps and APIs
Layers of protection can bring defense-in-depth practices to distributed clouds and other modern network architectures.
17 May 2024
Biztonsági szemle
Kea Performance Optimization
We have had a number of requests for suggestions about how to optimize Kea performance. These suggestions are general guidance; as always, your results will depend on your hardware and software choices, the size and complexity of your configuration...
17 May 2024
Biztonsági szemle
2 D-Link router bugs added to CISA’s exploited vulnerabilities catalog
CISA advises security teams to either patch immediately or simply replace the end-of-life routers.
17 May 2024
Biztonsági szemle
Kea Configuration for Cable Providers
The Network The network described here is a small cable modem-based ISP network with only one service area. This simple network is depicted in the diagram below. Requirements Summary A Kea configuration for cable services can be complicated even if...
17 May 2024
Biztonsági szemle
SEC Adds New Incident Response Rules for Financial Sector
Financial firms covered under new regulations will be required to establish a clear response and communications plan for customer data breaches.
Pagination
- Previous page ‹‹
- Page 827
- Next page ››