Security Bulletin
13 Mar 2026
Biztonsági szemle
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research from Omdia shows.
13 Mar 2026
Biztonsági szemle
Empowering the Future: Celebrating the International Day of Learning with Cisco Networking Academy
On International Day of Learning, we celebrate how Cisco NetAcad transforms lives—empowering 28 million learners worldwide with education in networking, cybersecurity, AI, and data science to build brighter futures.
13 Mar 2026
Biztonsági szemle
Most Google Cloud Attacks Start With Bug Exploitation
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud.
13 Mar 2026
Biztonsági szemle
Real-Time Banking Trojan Strikes Brazil's Pix Users
The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike.
13 Mar 2026
Biztonsági szemle
Flexible, Modernized Threat Protection in Cisco Secure Firewall 10.0
Cisco Secure Firewall 10.0 expands protection, better matches security rules to users and apps, & offers better threat detection. Learn more in our blog.
13 Mar 2026
Biztonsági szemle
Sajtószemle – 2026. 11. hét
Megjelent a 2026. 11. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2026.03.06. és 2026.03.12. között kezelt incidensek, valamint az elosztott kormányzati IT biztonsági csapdarendszerből (GovProbe1) származó adatok statisztikai eloszlását is...
12 Mar 2026
Biztonsági szemle
Launch of DevNet Content Search MCP Server
From Search on the Web to Search in the IDE Last year we launched AI-driven semantic search for Meraki API docs on developer.cisco.com—but developers live in their IDEs, not the browser. Without the right context, AI assistants in the IDE fall back...
12 Mar 2026
Biztonsági szemle
Why Post-Quantum Cryptography Can't Wait
Organizations have to prepare to ensure they have cryptography in place in the post-quantum world.
12 Mar 2026
Biztonsági szemle
Iran MOIS Colludes With Criminals to Boost Cyberattacks
Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups.
12 Mar 2026
Biztonsági szemle
Commercial Spyware Opponents Fear US Policy Shifting
Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line.
12 Mar 2026
Biztonsági szemle
Delinea's StrongDM Acquisition Highlights the Changing Role of PAM
StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments.
12 Mar 2026
Biztonsági szemle
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for.
Pagination
- Previous page ‹‹
- Page 10
- Next page ››